• DocumentCode
    2900614
  • Title

    Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection

  • Author

    Mehdi, Bilal ; Ahmed, Faraz ; Khayyam, Syed Ali ; Farooq, Muddassar

  • Author_Institution
    Next Generation Intell. Networks Res. Center (nexGIN RC)(FAST-NUCES), Islamabad, Pakistan
  • fYear
    2010
  • fDate
    23-27 May 2010
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    The major contribution of this paper is two-folds: (1) we present our novel variable-length system call representation scheme compared to existing fixed- length sequence schemes, and (2) using this representation, we present our in-execution malware detector that can not only identify zero-day malware without any a priori knowledge but can also detect a malicious process while it is executing. Our representation scheme - a more generalized version of n-gram - can be visualized in a k-dimensional hyperspace in which processes move depending upon their sequence of system calls. The process marks its impact in space by generating hyper-grams that are later used to evaluate an unknown process according to their profile. The proposed technique is evaluated on a real world dataset extracted from a Linux System. The results of our analysis show that our in-execution malware detector with hyper- gram representation achieves low processing overheads and improved detection accuracies as compared to conventional n-grams.
  • Keywords
    Communications Society; Computer science; Computer security; Detectors; Genetic algorithms; Information security; Intelligent networks; Linux; Next generation networking; Visualization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications (ICC), 2010 IEEE International Conference on
  • Conference_Location
    Cape Town, South Africa
  • ISSN
    1550-3607
  • Print_ISBN
    978-1-4244-6402-9
  • Type

    conf

  • DOI
    10.1109/ICC.2010.5501969
  • Filename
    5501969