The Application of Machine Learning to Study Malware Evolution

Article Preview

Abstract:

Malware evolves for the same reasons that ordinary software evolves. Like any other software product, the standard genetic operators selection, crossover and mutation are applied to evolve new malware. Recognizing and modeling how these malware evolve and are related is an important problem in the area of malware analysis. Grouping individual malware samples into malware families is not a new idea, and content-based comparison approaches have been proposed. Content-based approaches are hard to identify the real behavior of malware and it is inherently susceptible to inaccuracies due to polymorphic and metamorphic techniques. In this paper, we leveraged dynamic analysis approach to classify malware variants. The results demonstrate that our technique is able to recognize and group malware programs that behave similarly, achieving a better precision than previous approaches. The major advantage of our approach is that it can precisely tracks the sensitive information of malware behavior and is immune to obfuscation attempts. Our research is conducive to study the problem of malware classification, malware naming, and the phylogeny of malware.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

875-878

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] C. Willems, T. Holz, and F. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy, 5(2): 32-39 (2007).

DOI: 10.1109/msp.2007.45

Google Scholar

[2] Anubis: Analyzing Unknown Binaries, on http: /anubis. seclab. tuwien. ac. at.

Google Scholar

[3] A. Dinaburg, P. Royal, M. Sharif, et al. Ether: malware analysis via hardware virtualization extensions[C]/Proceedings of the 15th ACM conference on Computer and communications security. ACM, 51-62 (2008).

DOI: 10.1145/1455770.1455779

Google Scholar

[4] L. Breiman. Random Forests. Machine learning, 45(1): 5-32 (2001).

Google Scholar

[5] VXHeavens, on http: /vx. netlux. org.

Google Scholar