Title :
Detecting Trojan horses based on system behavior using machine learning method
Author :
Liu, Yu-Feng ; Zhang, Li-Wei ; Liang, Jian ; Qu, Sheng ; Ni, Zhi-Qiang
Author_Institution :
Data Min. Group, Tsinghua Univ., Beijing, China
Abstract :
The Research of detection malware using machine learning method attracts much attention recent years. However, most of research focused on code analysis which is signature-based or analysis of system call sequence in Linux environment. Obviously, all methods have their strengths and weaknesses. In this paper, we concentrate on detection Trojan horse by operation system information in Windows environment using data mining technology. Our main content and contribution contains as follows: First, we collect Trojan horse samples in true network environment and classify them by scanner. Secondly, we collect operation system behavior features under infected and clean circumstances separately by WMI manager tools. And then, several classic classification algorithms are applied and a performance comparison is given. Feature selection methods are applied to those features and we get a feature order list which reflects the relevance order of Trojan horse activities and the system feature. We believe the instructive meaning of the list is significant. Finally, a feature combination method is applied and features belongs different groups are combined according their characteristic for high classification performance. Results of experiments demonstrate the feasibility of our assumption that detecting Trojan horses by system behavior information is feasible and affective.
Keywords :
data mining; invasive software; learning (artificial intelligence); operating systems (computers); pattern classification; Linux environment; Trojan horse detection; WMI manager tools; Windows environment; classification algorithms; code analysis; data mining; feature combination; feature selection; machine learning; malware detection; operation system information; system behavior; Accuracy; Computers; Cybernetics; Learning systems; Machine learning; Trojan horses; Classification; Feature selection; System behavior; Trojan horse;
Conference_Titel :
Machine Learning and Cybernetics (ICMLC), 2010 International Conference on
Conference_Location :
Qingdao
Print_ISBN :
978-1-4244-6526-2
DOI :
10.1109/ICMLC.2010.5580591