Clustering based opcode graph generation for malware variant detection

11/18/2022
by   Kar-Wai Fok, et al.
0

Malwares are the key means leveraged by threat actors in the cyber space for their attacks. There is a large array of commercial solutions in the market and significant scientific research to tackle the challenge of the detection and defense against malwares. At the same time, attackers also advance their capabilities in creating polymorphic and metamorphic malwares to make it increasingly challenging for existing solutions. To tackle this issue, we propose a methodology to perform malware detection and family attribution. The proposed methodology first performs the extraction of opcodes from malwares in each family and constructs their respective opcode graphs. We explore the use of clustering algorithms on the opcode graphs to detect clusters of malwares within the same malware family. Such clusters can be seen as belonging to different sub-family groups. Opcode graph signatures are built from each detected cluster. Hence, for each malware family, a group of signatures is generated to represent the family. These signatures are used to classify an unknown sample as benign or belonging to one the malware families. We evaluate our methodology by performing experiments on a dataset consisting of both benign files and malware samples belonging to a number of different malware families and comparing the results to existing approach.

READ FULL TEXT
research
03/07/2021

Cluster Analysis of Malware Family Relationships

In this paper, we use K-means clustering to analyze various relationship...
research
04/02/2019

MalPaCA: Malware Packet Sequence Clustering and Analysis

Malware family characterization is a challenging problem because ground-...
research
06/22/2019

Andro-Simnet: Android Malware Family Classification Using Social Network Analysis

While the rapid adaptation of mobile devices changes our daily life more...
research
10/28/2022

A Deep Dive into VirusTotal: Characterizing and Clustering a Massive File Feed

Online scanners analyze user-submitted files with a large number of secu...
research
12/27/2018

Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations

In this work we propose a graph-based model that, utilizing relations be...
research
07/20/2012

Multisegmentation through wavelets: Comparing the efficacy of Daubechies vs Coiflets

In this paper, we carry out a comparative study of the efficacy of wavel...
research
06/01/2022

Detecting Cybercriminal Bitcoin Relationships through Backwards Exploration

Cybercriminals often leverage Bitcoin for their illicit activities. In t...

Please sign up or login with your details

Forgot password? Click here to reset