Title :
Machine learning for attack vector identification in malicious source code
Author :
Benjamin, Victor A. ; Hsinchun Chen
Author_Institution :
Dept. of Manage. Inf. Syst., Univ. of Arizona, Tucson, AZ, USA
Abstract :
As computers and information technologies become ubiquitous throughout society, the security of our networks and information technologies is a growing concern. As a result, many researchers have become interested in the security domain. Among them, there is growing interest in observing hacker communities for early detection of developing security threats and trends. Research in this area has often reported hackers openly sharing cybercriminal assets and knowledge with one another. In particular, the sharing of raw malware source code files has been documented in past work. Unfortunately, malware code documentation appears often times to be missing, incomplete, or written in a language foreign to researchers. Thus, analysis of such source files embedded within hacker communities has been limited. Here we utilize a subset of popular machine learning methodologies for the automated analysis of malware source code files. Specifically, we explore genetic algorithms to resolve questions related to feature selection within the context of malware analysis. Next, we utilize two common classification algorithms to test selected features for identification of malware attack vectors. Results suggest promising direction in utilizing such techniques to help with the automated analysis of malware source code.
Keywords :
computer crime; genetic algorithms; invasive software; learning (artificial intelligence); pattern classification; peer-to-peer computing; source coding; automated malware source code file analysis; classification algorithm; cybercriminal asset sharing; feature selection; genetic algorithm; hacker community; information technology; machine learning; malicious source code; malware attack vector identification; malware code documentation; security domain; security threat detection; Accuracy; Biological cells; Communities; Computer hacking; Malware; Support vector machine classification; Cyber security; Malware analysis; Static analysis;
Conference_Titel :
Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4673-6214-6
DOI :
10.1109/ISI.2013.6578779