• DocumentCode
    3586248
  • Title

    Mining Malware to Detect Variants

  • Author

    Azab, Ahmad ; Layton, Robert ; Alazab, Mamoun ; Oliver, Jonathan

  • Author_Institution
    Internet Commerce Security Lab., Federation Univ. Australia, VIC, Australia
  • fYear
    2014
  • Firstpage
    44
  • Lastpage
    53
  • Abstract
    Cybercrime continues to be a growing challenge and malware is one of the most serious security threats on the Internet today which have been in existence from the very early days. Cyber criminals continue to develop and advance their malicious attacks. Unfortunately, existing techniques for detecting malware and analysing code samples are insufficient and have significant limitations. For example, most of malware detection studies focused only on detection and neglected the variants of the code. Investigating malware variants allows antivirus products and governments to more easily detect these new attacks, attribution, predict such or similar attacks in the future, and further analysis. The focus of this paper is performing similarity measures between different malware binaries for the same variant utilizing data mining concepts in conjunction with hashing algorithms. In this paper, we investigate and evaluate using the Trend Locality Sensitive Hashing (TLSH) algorithm to group binaries that belong to the same variant together, utilizing the k-NN algorithm. Two Zeus variants were tested, TSPY_ZBOT and MAL_ZBOT to address the effectiveness of the proposed approach. We compare TLSH to related hashing methods (SSDEEP, SDHASH and NILSIMSA) that are currently used for this purpose. Experimental evaluation demonstrates that our method can effectively detect variants of malware and resilient to common obfuscations used by cyber criminals. Our results show that TLSH and SDHASH provide the highest accuracy results in scoring an F-measure of 0.989 and 0.999 respectively.
  • Keywords
    cryptography; data mining; file organisation; invasive software; F-measure; MAL-ZBOT algorithm; NILSIMSA hashing method; SDHASH hashing method; SSDEEP hashing method; TLSH algorithm; TSPY-ZBOT algorithm; Zeus variants; code analysis; cybercrime; data mining; k-NN algorithm; malicious attacks; malware binaries; malware mining; malware variant detection; security threats; similarity measures; trend locality sensitive hashing algorithm; Accuracy; Algorithm design and analysis; Data mining; Feature extraction; Frequency measurement; Malware; Market research; Cyber Security; Cybercrime; Hacking; Malware; Profiling; similarity;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cybercrime and Trustworthy Computing Conference (CTC), 2014 Fifth
  • Print_ISBN
    978-1-4799-8824-2
  • Type

    conf

  • DOI
    10.1109/CTC.2014.11
  • Filename
    7087327