Heterogeneous Graph Matching Networks

10/17/2019
by   Shen Wang, et al.
9

Information systems have widely been the target of malware attacks. Traditional signature-based malicious program detection algorithms can only detect known malware and are prone to evasion techniques such as binary obfuscation, while behavior-based approaches highly rely on the malware training samples and incur prohibitively high training cost. To address the limitations of existing techniques, we propose MatchGNet, a heterogeneous Graph Matching Network model to learn the graph representation and similarity metric simultaneously based on the invariant graph modeling of the program's execution behaviors. We conduct a systematic evaluation of our model and show that it is accurate in detecting malicious program behavior and can help detect malware attacks with less false positives. MatchGNet outperforms the state-of-the-art algorithms in malware detection by generating 50 keeping zero false negatives.

READ FULL TEXT

page 1

page 2

page 3

page 5

page 6

page 7

page 8

page 9

research
06/10/2019

SCGDet: Malware Detection using Semantic Features Based on Reachability Relation

Recently, with the booming development of software industry, more and mo...
research
06/23/2021

MG-DVD: A Real-time Framework for Malware Variant Detection Based on Dynamic Heterogeneous Graph Learning

Detecting the newly emerging malware variants in real time is crucial fo...
research
09/07/2021

POW-HOW: An enduring timing side-channel to evadeonline malware sandboxes

Online malware scanners are one of the best weapons in the arsenal of cy...
research
03/24/2018

Extended Abstract: Mimicry Resilient Program Behavior Modeling with LSTM based Branch Models

In the software design, protecting a computer system from a plethora of ...
research
12/17/2013

Mining Malware Specifications through Static Reachability Analysis

The number of malicious software (malware) is growing out of control. Sy...
research
11/10/2018

Metamorphic Malware Detection Using Linear Discriminant Analysis and Graph Similarity

The most common malware detection approaches which are based on signatur...
research
03/30/2021

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

In recent years malware has become increasingly sophisticated and diffic...

Please sign up or login with your details

Forgot password? Click here to reset