Published July 30, 2023 | Version CC BY-NC-ND 4.0
Journal article Open

Proposing A New Approach for Detecting Malware Based on the Event Analysis Technique

  • 1. Posts and Telecommunications Institute of Technology;
  • 2. Faculty of Information Technology, Hanoi University.

Contributors

Contact person:

  • 1. Posts and Telecommunications Institute of Technology;

Description

Abstract: The attack technique by the malware distribution form is a dangerous, difficult to detect and prevent attack method. Current malware detection studies and proposals are often based on two main methods: using sign sets and analyzing abnormal behaviors using machine learning or deep learning techniques. This paper will propose a method to detect malware on Endpoints based on Event IDs using deep learning. Event IDs are behaviors of malware tracked and collected on Endpoints' operating system kernel. The malware detection proposal based on Event IDs is a new research approach that has not been studied and proposed much. To achieve this purpose, this paper proposes to combine different data mining methods and deep learning algorithms. The data mining process is presented in detail in section 2 of the paper.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

H96510712823.pdf

Files (531.3 kB)

Name Size Download all
md5:06ed6626b2de2e72115a363f71673b23
531.3 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2278-3075 (ISSN)

References

  • Yanfang Ye, Tao Li, Donald Adjeroh, S. Sitharama Iyengar, A survey on malware detection using data mining techniques, ACM Comput. Surv, 50, 2017.
  • Daniel Gibert, Carles Mateu, Jordi Planes, The rise of machine learning for detection and classification of malware: Research developments, trends and challenges, Journal of Network and Computer Applications, 153, pp. 1-22, 2020.
  • Ucci, Daniele & Aniello, Leonardo, Survey on the Usage of Machine Learning Techniques for Malware Analysis, Computers & Security, 81, 2017.
  • Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay, Detection of Advanced Malware by Machine Learning Techniques, 2019. arXiv:1903.02966.
  • Alireza Souri, Rahil Hosseini, A state‑of‑the‑art survey of malware detection approaches using data mining techniques, 8, no. 3, pp 1-22, 2018.
  • Important Information Regarding Sandboxie Versions. https://www.sandboxie.com/. (Accessed on 26 August 2020)
  • Zhong Wei, Gu Feng, A Multi-Level Deep Learning System for Malware Detection, Expert Systems with Applications, 133, 2019.
  • Fei Xiao, Zhaowen Lin, Yi Sun, Yan Ma, Malware Detection Based on Deep Learning of Behavior Graphs, Mathematical Problems in Engineering.
  • M. Fan, J. Liu, X. Luo et al., Android malware familial classification and representative sample selection via frequent subgraph analysis, IEEE Transactions on Information Forensics and Security, 13, no. 8, pp. 1890–1905, 2018.
  • Z. Lin, X. Fei, S. Yi, Y. Ma, C.-C. Xing, J. Huang, A secure encryption-based malware detection system, KSII Transactions on Internet and Information Systems, 12, no. 4, pp. 1799–1818, 2018.
  • B. Kolosnjaji, A. Zarras, G. Webster, and C. Eckert, Deep learning for classification of malware system call sequences, in proceedings of the Australasian Joint Conference on Artificial Intelligence, Lecture Notes in Comput. Sci., pp. 137–149, 2016.
  • B. S. Abhishek and B. A. Prakash, Graphs for malware detection: the next frontier, in proceedings of the 13th International Workshop on Mining and Learning with Graphs (MLG), 2017.
  • Endpoint Detection and Response Solutions Market- https://www.gartner.com/reviews/market/endpoint-detection-and-response-solutions. (Accessed on 26 August 2020).
  • Sysmon v10.42. https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon (Accessed on 26 August 2021).
  • Dhananjay Kimothi, Akshay Soni, Pravesh Biyani, James M. Hogan, Distributed Representations for Biological Sequence Analysis. arXiv:1608.05949v2.
  • Quoc V. Le, Tomas Mikolov, Distributed Representations of Sentences and Documents. arXiv:1405.4053.
  • Daniel Svozil, Vladimir Kvasnicka, Jiří Pospíchal, Introduction to multi-layer feed-forward neural networks, Chemometrics and Intelligent Laboratory Systems, 39, no. 1, pp. 43-62, 1997.
  • Keiron O'Shea, Ryan Nash, An Introduction to Convolutional Neural Networks. arXiv, arXiv:1511.08458.
  • Sepp Hochreiter, Jürgen Schmidhuber, Long Short-Term Memory, Neural Computation, 9, no. 8, pp. 1735 - 1780, 1997.
  • Malware hunting with live access to the heart of an incident. https://app.any.run/ (Accessed on 26 August 2021).
  • S. Tobiyama, Y. Yamaguchi, H. Shimada, T. Ikuse, T. Yagi, Malware Detection with Deep Neural Network Using Process Behavior, in proceedings of 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), pp. 577-582, 2016.
  • Mehadi Hassen, Mehadi Hassen, Scalable Function Call Graph-based Malware Classification, in proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 239–248, 2017.

Subjects

ISSN: 2278-3075 (Online)
https://portal.issn.org/resource/ISSN/2278-3075#
Retrieval Number: 100.1/ijitee.H96510712823
https://www.ijitee.org/portfolio-item/H96510712823/
Journal Website: www.ijitee.org
https://www.ijitee.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/