Analyzing File-to-File Relation Network in Malware Detection

作者: Lingwei Chen , William Hardy , Yanfang Ye , Tao Li

DOI: 10.1007/978-3-319-26190-4_28

关键词:

摘要: Due to its major threats Internet security, malware detection is of great interest both the anti-malware industry and researchers. Currently, features beyond file content are starting be leveraged for e.g., file-to-file relations, which provide invaluable insight about properties samples. However, we still have much understand relationships benign files. In this paper, based on relation network, design several new robust graph-based reveal relationship characteristics. Based designed two findings, first apply Malicious Score Inference Algorithm MSIA select representative samples from large unknown collection labeling, then use Belief Propagation BP algorithm detect malware. To best our knowledge, investigation characteristics network in using social analysis. A comprehensive experimental study a sample relations obtained clients software Comodo Security Solutions Incorporation performed compare various approaches. Promising results demonstrate that accuracy efficiency proposed methods outperform other alternate data mining techniques.

参考文章(27)
Duen Horng Chau, Carey Nachenberg, Christos Faloutsos, Adam Wright, Jeffrey Wilhelm, Polonium: Tera-Scale Graph Mining for Malware Detection ,(2013)
Yanchao Zhang, Huan Liu, Jiliang Tang, Xia Hu, Social spammer detection in microblogging international joint conference on artificial intelligence. pp. 2633- 2639 ,(2013)
Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu, Using file relationships in malware classification international conference on detection of intrusions and malware and vulnerability assessment. pp. 1- 20 ,(2012) , 10.1007/978-3-642-37300-8_1
Teng-Sheng Moh, Alexander J. Murmann, Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers international conference on information systems, technology and management. pp. 210- 220 ,(2010) , 10.1007/978-3-642-12035-0_21
Chao Yang, Robert Chandler Harkreader, Guofei Gu, Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers Lecture Notes in Computer Science. pp. 318- 337 ,(2011) , 10.1007/978-3-642-23644-0_17
A.H. Sung, J. Xu, P. Chavez, S. Mukkamala, Static analyzer of vicious executables (SAVE) annual computer security applications conference. pp. 326- 334 ,(2004) , 10.1109/CSAC.2004.37
Chengfeng Lin, Jianhua He, Yi Zhou, Xiaokang Yang, Kai Chen, Li Song, None, Analysis and identification of spamming behaviors in Sina Weibo microblog social network mining and analysis. pp. 5- ,(2013) , 10.1145/2501025.2501035
I-Hsien Ting, Shyue-Liang Wang, Hsing-Miao Chi, Jyun-Sing Wu, Content matters: a study of hate groups detection based on social networks analysis and web mining advances in social networks analysis and mining. pp. 1196- 1201 ,(2013) , 10.1145/2492517.2500254
Jonathan S. Yedidia, Yair Weiss, William T. Freeman, Understanding belief propagation and its generalizations Exploring artificial intelligence in the new millennium. pp. 239- 269 ,(2003)
Yanfang Ye, Tao Li, Shenghuo Zhu, Weiwei Zhuang, Egemen Tas, Umesh Gupta, Melih Abdulhayoglu, Combining file content and file relations for cloud based malware detection Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '11. pp. 222- 230 ,(2011) , 10.1145/2020408.2020448