Using Static and Dynamic Malware features to perform Malware Ascription

12/05/2021
by   Jashanpreet Singh Sraw, et al.
0

Malware ascription is a relatively unexplored area, and it is rather difficult to attribute malware and detect authorship. In this paper, we employ various Static and Dynamic features of malicious executables to classify malware based on their family. We leverage Cuckoo Sandbox and machine learning to make progress in this research. Post analysis, classification is performed using various deep learning and machine learning algorithms. Using the features gathered from VirusTotal (static) and Cuckoo (dynamic) reports, we ran the vectorized data against Multinomial Naive Bayes, Support Vector Machine, and Bagging using Decision Trees as the base estimator. For each classifier, we tuned the hyper-parameters using exhaustive search methods. Our reports can be extremely useful in malware ascription.

READ FULL TEXT
research
12/24/2019

Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural Network

Deep learning has been used in the research of malware analysis. Most cl...
research
11/30/2021

New Datasets for Dynamic Malware Classification

Nowadays, malware and malware incidents are increasing daily, even with ...
research
07/27/2018

Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware

Ransomware is a significant global threat, with easy deployment due to t...
research
05/30/2019

An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU

Due to continuous increase in the number of malware (according to AV-Tes...
research
02/15/2018

NtMalDetect: A Machine Learning Approach to Malware Detection Using Native API System Calls

As computing systems become increasingly advanced and as users increasin...
research
04/22/2018

MEADE: Towards a Malicious Email Attachment Detection Engine

Malicious email attachments are a growing delivery vector for malware. W...
research
04/12/2022

Malware Analysis with Symbolic Execution and Graph Kernel

Malware analysis techniques are divided into static and dynamic analysis...

Please sign up or login with your details

Forgot password? Click here to reset