• DocumentCode
    5336
  • Title

    Approach for malware identification using dynamic behaviour and outcome triggering

  • Author

    Hao Bai ; Chang-zhen Hu ; Xiao-chuan Jing ; Ning Li ; Xiao-yin Wang

  • Author_Institution
    Sch. of Comput. Sci. & Technol., Beijing Inst. of Technol., Beijing, China
  • Volume
    8
  • Issue
    2
  • fYear
    2014
  • fDate
    Mar-14
  • Firstpage
    140
  • Lastpage
    151
  • Abstract
    Malware identification is the process of determining the maliciousness of a program, which is necessary for detecting malware variants. Although some techniques have been developed to confront the rapid expansion of malware, they are not efficient to recognise booming malware instances, and can be evaded by using obfuscation techniques. In this study, a novel dynamic malware identification approach is proposed. Concretely, this approach employs techniques that explore multiple execution paths and trigger malicious behaviours with resulting outcomes. To this end, a group of featured malicious behaviours and outcomes (MBOs) are primarily constructed, from which weights for malware family classification are derived. A virtual monitor is then developed to dynamically trigger MBOs by exploring multipath with suitable probing depths. Finally, triggered malicious behaviours are modelled with features recorded in MBOs to train a malware classifier which can identify unknown malware variants. The experimental results on test cases demonstrate the proposed approach is effective in identifying new variants of popular malware families. The comparison with latest malware identifiers shows that our approach achieves lower false positive rate and can recognise malware equipped with obfuscation techniques.
  • Keywords
    invasive software; pattern classification; MBO; dynamic behaviour; malicious behaviours and outcomes; malware classifier; malware family classification; multiple execution paths; novel dynamic malware identification approach; obfuscation techniques; outcome triggering; probing depths; virtual monitor;
  • fLanguage
    English
  • Journal_Title
    Information Security, IET
  • Publisher
    iet
  • ISSN
    1751-8709
  • Type

    jour

  • DOI
    10.1049/iet-ifs.2012.0343
  • Filename
    6748548