{"title":"A method for estimating process maliciousness with Seq2Seq model","authors":"Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi","doi":"10.1109/ICOIN.2018.8343120","DOIUrl":null,"url":null,"abstract":"In recent years, cyber-attacks become more sophisticated and the damage caused by these attacks also becomes serious problem. In these attacks, specially-crafted malware, which utilizes countermeasures such as post execution binary elimination or process injection, is used not to be noticed by a target. Therefore, it is hard to detect malware used in these attacks with binary-dependent method before the intrusion, and the countermeasure after intrusion is required. This paper proposes an infection detection method by estimating maliciousness of processes in Windows machines. In our proposal, we extract feature vector sequence from process behavior captured by Process Monitor with Seq2Seq model at first, and then estimate the process maliciousness by classifying with the other Seq2Seq model. We evaluated the performance of our proposal by 5-fold cross validation and compared the performance with the method using uni-gram feature.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2018.8343120","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In recent years, cyber-attacks become more sophisticated and the damage caused by these attacks also becomes serious problem. In these attacks, specially-crafted malware, which utilizes countermeasures such as post execution binary elimination or process injection, is used not to be noticed by a target. Therefore, it is hard to detect malware used in these attacks with binary-dependent method before the intrusion, and the countermeasure after intrusion is required. This paper proposes an infection detection method by estimating maliciousness of processes in Windows machines. In our proposal, we extract feature vector sequence from process behavior captured by Process Monitor with Seq2Seq model at first, and then estimate the process maliciousness by classifying with the other Seq2Seq model. We evaluated the performance of our proposal by 5-fold cross validation and compared the performance with the method using uni-gram feature.