Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering

01/04/2019
by   Aziz Mohaisen, et al.
0

Using runtime execution artifacts to identify malware and its associated family is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interaction. While effective, the use of these fine-granularity data points makes these techniques computationally expensive. Moreover, the signatures and heuristics are often circumvented by subsequent malware authors. In this work, we propose Chatter, a system that is concerned only with the order in which high-level system events take place. Individual events are mapped onto an alphabet and execution traces are captured via terse concatenations of those letters. Then, leveraging an analyst labeled corpus of malware, n-gram document classification techniques are applied to produce a classifier predicting malware family. This paper describes that technique and its proof-of-concept evaluation. In its prototype form, only network events are considered and eleven malware families are used. We show the technique achieves 83 when integrated with a baseline classifier of combined order features to reach an accuracy of up to 98.8

READ FULL TEXT
research
11/19/2018

Behavioral Malware Classification using Convolutional Recurrent Neural Networks

Behavioral malware detection aims to improve on the performance of stati...
research
12/24/2019

Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural Network

Deep learning has been used in the research of malware analysis. Most cl...
research
07/22/2018

Deep learning at the shallow end: Malware classification for non-domain experts

Current malware detection and classification approaches generally rely o...
research
06/23/2021

Learning Explainable Representations of Malware Behavior

We address the problems of identifying malware in network telemetry logs...
research
01/29/2021

Peeler: Profiling Kernel-Level Events to Detect Ransomware

Ransomware is a growing threat that typically operates by either encrypt...
research
08/01/2019

KiloGrams: Very Large N-Grams for Malware Classification

N-grams have been a common tool for information retrieval and machine le...

Please sign up or login with your details

Forgot password? Click here to reset