SCGDet: Malware Detection using Semantic Features Based on Reachability Relation

06/10/2019
by   Renjie Lu, et al.
0

Recently, with the booming development of software industry, more and more malware variants are designed to perform malicious behaviors. The evolution of malware makes it difficult to detect using traditional signature-based methods. Moreover, malware detection has important effect on system security. In this paper, we present SCGDet, which is a novel malware detection method based on system call graph model (SCGM). We first develop a system call pruning method, which can exclude system calls that have little impact on malware detection. Then we propose the SCGM, which can capture the semantic features of run-time program by grouping the system calls based on the reachability relation. We aim to obtain the generic representation of malicious behaviors with similar system call patterns. We evaluate the performance of SCGDet using different machine learning algorithms on the dataset including 854 malware samples and 740 benign samples. Compared with the traditional n-gram method, the SCGDet has the smaller feature space, the higher detection accuracy and the lower false positives. Experimental results show that SCGDet can reduce the average FPR of 14.75 97.44

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/10/2019

Malware Detection with LSTM using Opcode Language

Nowadays, with the booming development of Internet and software industry...
research
10/17/2019

Heterogeneous Graph Matching Networks

Information systems have widely been the target of malware attacks. Trad...
research
03/30/2021

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

In recent years malware has become increasingly sophisticated and diffic...
research
12/27/2018

Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations

In this work we propose a graph-based model that, utilizing relations be...
research
12/03/2018

Malware static analysis and DDoS capabilities detection

The present thesis addresses the topic of denial of service capabilities...
research
12/17/2013

Mining Malware Specifications through Static Reachability Analysis

The number of malicious software (malware) is growing out of control. Sy...
research
02/07/2019

Dual-task agent for run-time classification and killing of malicious processes

Malicious software (malware) is one of the key vectors for cyber crimina...

Please sign up or login with your details

Forgot password? Click here to reset