{"title":"基于机器学习的新型Windows事件增强动态恶意软件行为分析","authors":"Göksun Önal;Mesut Güven","doi":"10.1109/ACCESS.2025.3604979","DOIUrl":null,"url":null,"abstract":"Malware analysis involves studying harmful software to understand its behavior and find ways to detect and prevent it. As cyberattacks become more advanced, this process becomes increasingly important for safeguarding systems and data. Traditional methods in malware analysis often rely on examining the code itself, which can miss malicious actions that only occur during execution. This study addresses this limitation by combining the dynamic observation of malware behavior with an innovative use of Windows Event Logs as input, a detailed system data source. During the study, a secure environment was created to safely execute malware, collect input, and provide valuable information on how malicious software interacts with systems. New methods were developed to extract meaningful information from the logs, then used to train machine-learning models capable of accurately distinguishing malware from legitimate programs. By demonstrating the untapped potential of Windows Event Logs, this study offers new tools to improve real-time malware detection and enhance cybersecurity. On a dataset of approximate 7000 Windows executable file, roughly sixty percent benign and forty percent malware, the log-feature MLP reached 91.2 % accuracy with a 1.6-point standard deviation across five folds, achieved a ROC-AUC of <inline-formula> <tex-math>$0.962~\\pm ~0.009$ </tex-math></inline-formula> on an unseen hold out set.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"153937-153958"},"PeriodicalIF":3.6000,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146719","citationCount":"0","resultStr":"{\"title\":\"Enhancing Dynamic Malware Behavior Analysis Through Novel Windows Events With Machine Learning\",\"authors\":\"Göksun Önal;Mesut Güven\",\"doi\":\"10.1109/ACCESS.2025.3604979\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malware analysis involves studying harmful software to understand its behavior and find ways to detect and prevent it. As cyberattacks become more advanced, this process becomes increasingly important for safeguarding systems and data. Traditional methods in malware analysis often rely on examining the code itself, which can miss malicious actions that only occur during execution. This study addresses this limitation by combining the dynamic observation of malware behavior with an innovative use of Windows Event Logs as input, a detailed system data source. During the study, a secure environment was created to safely execute malware, collect input, and provide valuable information on how malicious software interacts with systems. New methods were developed to extract meaningful information from the logs, then used to train machine-learning models capable of accurately distinguishing malware from legitimate programs. By demonstrating the untapped potential of Windows Event Logs, this study offers new tools to improve real-time malware detection and enhance cybersecurity. On a dataset of approximate 7000 Windows executable file, roughly sixty percent benign and forty percent malware, the log-feature MLP reached 91.2 % accuracy with a 1.6-point standard deviation across five folds, achieved a ROC-AUC of <inline-formula> <tex-math>$0.962~\\\\pm ~0.009$ </tex-math></inline-formula> on an unseen hold out set.\",\"PeriodicalId\":13079,\"journal\":{\"name\":\"IEEE Access\",\"volume\":\"13 \",\"pages\":\"153937-153958\"},\"PeriodicalIF\":3.6000,\"publicationDate\":\"2025-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146719\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Access\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11146719/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Access","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11146719/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Enhancing Dynamic Malware Behavior Analysis Through Novel Windows Events With Machine Learning
Malware analysis involves studying harmful software to understand its behavior and find ways to detect and prevent it. As cyberattacks become more advanced, this process becomes increasingly important for safeguarding systems and data. Traditional methods in malware analysis often rely on examining the code itself, which can miss malicious actions that only occur during execution. This study addresses this limitation by combining the dynamic observation of malware behavior with an innovative use of Windows Event Logs as input, a detailed system data source. During the study, a secure environment was created to safely execute malware, collect input, and provide valuable information on how malicious software interacts with systems. New methods were developed to extract meaningful information from the logs, then used to train machine-learning models capable of accurately distinguishing malware from legitimate programs. By demonstrating the untapped potential of Windows Event Logs, this study offers new tools to improve real-time malware detection and enhance cybersecurity. On a dataset of approximate 7000 Windows executable file, roughly sixty percent benign and forty percent malware, the log-feature MLP reached 91.2 % accuracy with a 1.6-point standard deviation across five folds, achieved a ROC-AUC of $0.962~\pm ~0.009$ on an unseen hold out set.
IEEE AccessCOMPUTER SCIENCE, INFORMATION SYSTEMSENGIN-ENGINEERING, ELECTRICAL & ELECTRONIC
CiteScore
9.80
自引率
7.70%
发文量
6673
审稿时长
6 weeks
期刊介绍:
IEEE Access® is a multidisciplinary, open access (OA), applications-oriented, all-electronic archival journal that continuously presents the results of original research or development across all of IEEE''s fields of interest.
IEEE Access will publish articles that are of high interest to readers, original, technically correct, and clearly presented. Supported by author publication charges (APC), its hallmarks are a rapid peer review and publication process with open access to all readers. Unlike IEEE''s traditional Transactions or Journals, reviews are "binary", in that reviewers will either Accept or Reject an article in the form it is submitted in order to achieve rapid turnaround. Especially encouraged are submissions on:
Multidisciplinary topics, or applications-oriented articles and negative results that do not fit within the scope of IEEE''s traditional journals.
Practical articles discussing new experiments or measurement techniques, interesting solutions to engineering.
Development of new or improved fabrication or manufacturing techniques.
Reviews or survey articles of new or evolving fields oriented to assist others in understanding the new area.