Classification of PE Files using Static Analysis

作者: Ashish Saini , Ekta Gandotra , Divya Bansal , Sanjeev Sofat

DOI: 10.1145/2659651.2659679

关键词:

摘要: Malware is one of the most terrible and major security threats facing Internet today. Anti-malware vendors are challenged to identify, classify counter new malwares due obfuscation techniques being used by malware authors. In this paper, we present a simple, fast scalable method differentiating from cleanwares on basis features extracted Windows PE files. The in work Suspicious Section Count Function Call Frequency. After automatically extracting executables, use machine learning algorithms available WEKA library them into cleanwares. Our experimental results provide an accuracy over 98% for data set 3,087 executable files including 2,460 627 Based obtained, conclude that Frequency feature derived static analysis plays significant role distinguishing benign ones.

参考文章(19)
Morgan C. Wang, Muazzam Siddiqui, Joohan Lee, Data mining methods for malware detection using instruction sequences international conference on artificial intelligence and applications. pp. 358- 363 ,(2008)
Igor Santos, Yoseba K Penya, Jaime Devesa, Pablo G Bringas, None, N-GRAMS-BASED FILE SIGNATURES FOR MALWARE DETECTION Proceedings of the 11th International Conference on Enterprise Information. pp. 317- 320 ,(2009) , 10.5220/0001863603170320
J.-Y. Xu, A.H. Sung, P. Chavez, S. Mukkamala, Polymorphic malicious executable scanner by API sequence analysis international conference hybrid intelligent systems. pp. 378- 383 ,(2004) , 10.1109/ICHIS.2004.75
Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer, Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey Information Security Technical Report. ,vol. 14, pp. 16- 29 ,(2009) , 10.1016/J.ISTR.2009.03.003
L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath, Malware images: visualization and automatic classification visualization for computer security. pp. 4- ,(2011) , 10.1145/2016904.2016908
Ilsun You, Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey broadband and wireless computing, communication and applications. pp. 297- 300 ,(2010) , 10.1109/BWCCA.2010.85
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang, Automatic malware categorization using cluster ensemble knowledge discovery and data mining. pp. 95- 104 ,(2010) , 10.1145/1835804.1835820
Ekta Gandotra, Divya Bansal, Sanjeev Sofat, Malware Analysis and Classification: A Survey Journal of Information Security. ,vol. 5, pp. 56- 64 ,(2014) , 10.4236/JIS.2014.52006
Ronghua Tian, Lynn Batten, Rafiqul Islam, Steve Versteeg, An automated classification system based on the strings of trojan and virus families international conference on malicious and unwanted software. pp. 23- 30 ,(2009) , 10.1109/MALWARE.2009.5403021
Jeremy Z. Kolter, Marcus A. Maloof, Learning to detect malicious executables in the wild knowledge discovery and data mining. pp. 470- 478 ,(2004) , 10.1145/1014052.1014105