{"title":"恶意软件检测的最大频繁子图挖掘","authors":"Aya Hellal, L. Romdhane","doi":"10.1109/ISDA.2015.7489265","DOIUrl":null,"url":null,"abstract":"Malware detection has been one of the current computer security topics of great interest. Traditional signature-based malware detection fails to detect variants of known malware or previously unseen malware. To deal with this issue, machine learning and data mining methods have been widely used to counter the obfuscation techniques of attackers by examining the underlying behavior of suspected malware. However, these methods still suffer from the large number of extracted features and the lack of precise specifications which affects badly scanning time and the accuracy of the malware detection process. In this paper, we present an automatic detection method based on graph mining techniques. Maximal frequent subgraphs in a set of code graphs, representing common behaviors with precise specifications in execution files, are extracted and used as features to generate semantic signatures. These semantic signatures are represented by a set of learning models and employed to distinguish malware programs from benign. Experimental results indicate that our method extracts a limited number of interesting features and achieves effective malware detection.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Maximal frequent sub-graph mining for malware detection\",\"authors\":\"Aya Hellal, L. Romdhane\",\"doi\":\"10.1109/ISDA.2015.7489265\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malware detection has been one of the current computer security topics of great interest. Traditional signature-based malware detection fails to detect variants of known malware or previously unseen malware. To deal with this issue, machine learning and data mining methods have been widely used to counter the obfuscation techniques of attackers by examining the underlying behavior of suspected malware. However, these methods still suffer from the large number of extracted features and the lack of precise specifications which affects badly scanning time and the accuracy of the malware detection process. In this paper, we present an automatic detection method based on graph mining techniques. Maximal frequent subgraphs in a set of code graphs, representing common behaviors with precise specifications in execution files, are extracted and used as features to generate semantic signatures. These semantic signatures are represented by a set of learning models and employed to distinguish malware programs from benign. Experimental results indicate that our method extracts a limited number of interesting features and achieves effective malware detection.\",\"PeriodicalId\":196743,\"journal\":{\"name\":\"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDA.2015.7489265\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDA.2015.7489265","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Maximal frequent sub-graph mining for malware detection
Malware detection has been one of the current computer security topics of great interest. Traditional signature-based malware detection fails to detect variants of known malware or previously unseen malware. To deal with this issue, machine learning and data mining methods have been widely used to counter the obfuscation techniques of attackers by examining the underlying behavior of suspected malware. However, these methods still suffer from the large number of extracted features and the lack of precise specifications which affects badly scanning time and the accuracy of the malware detection process. In this paper, we present an automatic detection method based on graph mining techniques. Maximal frequent subgraphs in a set of code graphs, representing common behaviors with precise specifications in execution files, are extracted and used as features to generate semantic signatures. These semantic signatures are represented by a set of learning models and employed to distinguish malware programs from benign. Experimental results indicate that our method extracts a limited number of interesting features and achieves effective malware detection.