skip to main content
article

Automatic analysis of malware behavior using machine learning

Published: 01 December 2011 Publication History

Abstract

Malicious software - so called malware - poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffective, such that millions of hosts in the Internet are infected with malware in the form of computer viruses, Internet worms and Trojan horses. While obfuscation and polymorphism employed by malware largely impede detection at file level, the dynamic analysis of malware binaries during run-time provides an instrument for characterizing and defending against the threat of malicious software.
In this article, we propose a framework for the automatic analysis of malware behavior using machine learning. The framework allows for automatically identifying novel classes of malware with similar behavior (clustering) and assigning unknown malware to these discovered classes (classification). Based on both, clustering and classification, we propose an incremental approach for behavior-based analysis, capable of processing the behavior of thousands of malware binaries on a daily basis. The incremental analysis significantly reduces the run-time overhead of current analysis methods, while providing accurate discovery and discrimination of novel malware variants.

Cited By

View all
  • (2023)A Survey of Malware Analysis Using Community Detection AlgorithmsACM Computing Surveys10.1145/361022356:2(1-29)Online publication date: 15-Sep-2023
  • (2023)Data Auditing for Intelligent Network Security MonitoringIEEE Communications Magazine10.1109/MCOM.003.220004661:3(74-79)Online publication date: 1-Mar-2023
  • (2022)Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data ProtectionSecurity and Communication Networks10.1155/2022/14246382022Online publication date: 1-Jan-2022
  • Show More Cited By
  1. Automatic analysis of malware behavior using machine learning

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Journal of Computer Security
    Journal of Computer Security  Volume 19, Issue 4
    December 2011
    156 pages

    Publisher

    IOS Press

    Netherlands

    Publication History

    Published: 01 December 2011

    Author Tags

    1. Malicious software
    2. behavior-based analysis
    3. classification
    4. clustering

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 23 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A Survey of Malware Analysis Using Community Detection AlgorithmsACM Computing Surveys10.1145/361022356:2(1-29)Online publication date: 15-Sep-2023
    • (2023)Data Auditing for Intelligent Network Security MonitoringIEEE Communications Magazine10.1109/MCOM.003.220004661:3(74-79)Online publication date: 1-Mar-2023
    • (2022)Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data ProtectionSecurity and Communication Networks10.1155/2022/14246382022Online publication date: 1-Jan-2022
    • (2022)Shedding Light on the Targeted Victim Profiles of Malicious DownloadersProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544435(1-10)Online publication date: 23-Aug-2022
    • (2022)MAB-MalwareProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3497768(990-1003)Online publication date: 30-May-2022
    • (2021)Towards Next-Generation Cybersecurity with Graph AIACM SIGOPS Operating Systems Review10.1145/3469379.346938655:1(61-67)Online publication date: 6-Jun-2021
    • (2021)Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG)Proceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3470115(1-12)Online publication date: 17-Aug-2021
    • (2021)Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security DomainACM Computing Surveys10.1145/345315854:5(1-36)Online publication date: 25-May-2021
    • (2021)HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical AnalysisMILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM52596.2021.9653097(709-714)Online publication date: 29-Nov-2021
    • (2020)Advanced Windows Methods on Malware Detection and ClassificationProceedings of the 36th Annual Computer Security Applications Conference10.1145/3427228.3427242(54-68)Online publication date: 7-Dec-2020
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media