Optimal Feature Selection for Non-Network Malware Classification

In this digital age, almost every system and service has moved from a localized to a digital environment. Consequently the number of attacks targeting both personal as well as commercial digital devices has also increased exponentially. In most cases specific malware attacks have caused widespread damage and emotional anguish. Though there are automated techniques to analyse and thwart such attacks, they are still far from perfect. This paper identifies optimal features, which improves the accuracy and efficiency of the classification process, required for malware classification in an attempt to assist automated anti-malware systems identify and block malware families in an attempt to secure the end user and reduce the damage caused by these malicious software.

[1]  Karthik Raman,et al.  Selecting Features to Classify Malware , 2012 .

[2]  Jianhui Lin On Malicious Software Classification , 2008, 2008 International Symposium on Intelligent Information Technology Application Workshops.

[3]  Yuval Elovici,et al.  Unknown malcode detection via text categorization and the imbalance problem , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[4]  Paul A. Watters,et al.  RBACS: Rootkit Behavioral Analysis and Classification System , 2010, 2010 Third International Conference on Knowledge Discovery and Data Mining.

[5]  Marius Kloft,et al.  Early detection of malicious behavior in JavaScript code , 2012, AISec '12.

[6]  Seyed Vahid Azhari,et al.  Host Hypervisor Trace Mining for Virtual Machine Workload Characterization , 2019, 2019 IEEE International Conference on Cloud Engineering (IC2E).

[7]  Marcus A. Maloof,et al.  Learning to detect malicious executables in the wild , 2004, KDD.

[8]  Md. Rafiqul Islam,et al.  An automated classification system based on the strings of trojan and virus families , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[9]  Salvatore J. Stolfo,et al.  Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[10]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[11]  Anjana V. Kumar,et al.  Split personality malware detection and defeating in popular virtual machines , 2012, SIN '12.

[12]  Kun Wang,et al.  A Risk Assessment Method based on Software Behavior , 2019, 2019 IEEE International Conference on Intelligence and Security Informatics (ISI).

[13]  Lior Rokach,et al.  Improving malware detection by applying multi-inducer ensemble , 2009, Comput. Stat. Data Anal..

[14]  Zhuoqing Morley Mao,et al.  Automated Classification and Analysis of Internet Malware , 2007, RAID.

[15]  Lynn Margaret Batten,et al.  Function length as a tool for malware classification , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[16]  Yuval Elovici,et al.  Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..

[17]  Radu State,et al.  Malware behaviour analysis , 2008, Journal in Computer Virology.

[18]  Douglas S. Reeves,et al.  Fast malware classification by automated behavioral graph matching , 2010, CSIIRW '10.

[19]  Christopher Krügel,et al.  Scalable, Behavior-Based Malware Clustering , 2009, NDSS.

[20]  Muhammad Zubair Shafiq,et al.  Using spatio-temporal information in API calls with machine learning algorithms for malware detection , 2009, AISec '09.

[21]  Jie He,et al.  Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[22]  Andrew H. Sung,et al.  Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.

[23]  Vlado Keselj,et al.  N-gram-based detection of new malicious code , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..

[24]  Salvatore J. Stolfo,et al.  Towards Stealthy Malware Detection , 2007, Malware Detection.

[25]  M. Ritwik,et al.  Analyzing the Makier Virus , 2013 .

[26]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[27]  Jiawei Han,et al.  Mining Multiple-Level Association Rules in Large Databases , 1999, IEEE Trans. Knowl. Data Eng..

[28]  Jiawei Han,et al.  Frequent pattern mining: current status and future directions , 2007, Data Mining and Knowledge Discovery.

[29]  T. Gireesh Kumar,et al.  Static and Dynamic Analysis for Android Malware Detection , 2018, CloudCom 2018.