Would a File by Any Other Name Seem as Malicious?

10/10/2019
by   Andre T. Nguyen, et al.
0

Successful malware attacks on information technology systems can cause millions of dollars in damage, the exposure of sensitive and private information, and the irreversible destruction of data. Anti-virus systems that analyze a file's contents use a combination of static and dynamic analysis to detect and remove/remediate such malware. However, examining a file's entire contents is not always possible in practice, as the volume and velocity of incoming data may be too high, or access to the underlying file contents may be restricted or unavailable. If it were possible to obtain estimates of a file's relative likelihood of being malicious without looking at the file contents, we could better prioritize file processing order and aid analysts in situations where a file is unavailable. In this work, we demonstrate that file names can contain information predictive of the presence of malware in a file. In particular, we show the effectiveness of a character-level convolutional neural network at predicting malware status using file names on Endgame's EMBER malware detection benchmark dataset.

READ FULL TEXT

page 7

page 8

page 9

research
07/26/2023

Open Image Content Disarm And Reconstruction

With the advance in malware technology, attackers create new ways to hid...
research
07/31/2023

Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?

Indicators of Compromise (IOCs), such as IP addresses, file hashes, and ...
research
05/16/2019

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Machine learning (ML) used for static portable executable (PE) malware d...
research
05/06/2015

Taking back control of HPC file systems with Robinhood Policy Engine

Today, the largest Lustre file systems store billions of entries. On suc...
research
10/02/2021

Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis

Malware as defined by Kaspersky Labs is a type of computer program desig...
research
04/10/2018

Monotonic models for real-time dynamic malware detection

In dynamic malware analysis, programs are classified as malware or benig...
research
05/24/2018

Detecting Homoglyph Attacks with a Siamese Neural Network

A homoglyph (name spoofing) attack is a common technique used by adversa...

Please sign up or login with your details

Forgot password? Click here to reset