A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection

作者: Shamsul Huda , Rafiqul Islam , Jemal Abawajy , John Yearwood , Mohammad Mehedi Hassan

DOI: 10.1016/J.FUTURE.2017.12.037

关键词:

摘要: Abstract Malicious software (malware) constitute one of the most pressing cyber threats intended to cripple critical infrastructure, render infected systems unusable, permanently erase data from storage systems. The number malware has skyrocketed through use enormous development toolkit. Run-time analysis recently been used overcome limitations current detection engines due code obfuscation techniques such as polymorphism and metamorphism. However run-time approaches face a challenge processing large features which may fail provide real time protection. In this paper, we propose hybrid framework by using more than complementary filters wrapper feature selection approach identify significant behavioural characteristics malware. novelty proposed is that it exploits within-filters between wrapper-filters hybridizing discriminant, minimum redundant, maximum relevant with integrate knowledge intrinsic behaviour obtained into process. We have verified performance extensive experiments datasets. results show finds When these are in engine, computational performances accuracies also improved up 99 . 499 % compared any existing techniques.

参考文章(44)
Monirul Sharif, Vinod Yegneswaran, Hassen Saidi, Phillip Porras, Wenke Lee, Eureka: A Framework for Enabling Static Malware Analysis european symposium on research in computer security. pp. 481- 500 ,(2008) , 10.1007/978-3-540-88313-5_31
Christian D'Orazio, Kim-Kwang Raymond Choo, An adversary model to evaluate DRM protection of video contents on iOS devices Computers & Security. ,vol. 56, pp. 94- 110 ,(2016) , 10.1016/J.COSE.2015.06.009
Marko Robnik-Šikonja, Igor Kononenko, Theoretical and Empirical Analysis of ReliefF and RReliefF Machine Learning. ,vol. 53, pp. 23- 69 ,(2003) , 10.1023/A:1025667309714
Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti, Employing Program Semantics for Malware Detection IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 2591- 2604 ,(2015) , 10.1109/TIFS.2015.2469253
Hao Bai, Chang-zhen Hu, Xiao-yin Wang, Ning Li, Xiao-chuan Jing, Approach for malware identification using dynamic behaviour and outcome triggering Iet Information Security. ,vol. 8, pp. 140- 151 ,(2014) , 10.1049/IET-IFS.2012.0343
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis IEEE Transactions on Parallel and Distributed Systems. ,vol. 25, pp. 447- 456 ,(2014) , 10.1109/TPDS.2013.146
Zongqu Zhao, Jinrong Bai, Junfeng Wang, Malware detection method based on the control-flow construct feature of software Iet Information Security. ,vol. 8, pp. 18- 24 ,(2014) , 10.1049/IET-IFS.2012.0289
Junghwan Rhee, Ryan Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Data-Centric OS Kernel Malware Characterization IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 72- 87 ,(2014) , 10.1109/TIFS.2013.2291964
Zhiyong Shan, Xin Wang, Growing Grapes in Your Computer to Defend Against Malware IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 196- 207 ,(2014) , 10.1109/TIFS.2013.2291066