Zobrazit minimální záznam

dc.contributor.authorAmer, Eslam
dc.contributor.authorEl-Sappagh, Shaker
dc.contributor.authorHu, Jong Wan
dc.date.accessioned2021-01-18T11:14:06Z
dc.date.available2021-01-18T11:14:06Z
dc.date.issued2020
dc.identifier.citationApplied Sciences. 2020, vol. 10, issue 21, art. no. 7673.cs
dc.identifier.issn2076-3417
dc.identifier.urihttp://hdl.handle.net/10084/142567
dc.description.abstractThe proper interpretation of the malware API call sequence plays a crucial role in identifying its malicious intent. Moreover, there is a necessity to characterize smart malware mimicry activities that resemble goodware programs. Those types of malware imply further challenges in recognizing their malicious activities. In this paper, we propose a standard and straightforward contextual behavioral models that characterize Windows malware and goodware. We relied on the word embedding to realize the contextual association that may occur between API functions in malware sequences. Our empirical results proved that there is a considerable distinction between malware and goodware call sequences. Based on that distinction, we propose a new method to detect malware that relies on the Markov chain. We also propose a heuristic method that identifies malware's mimicry activities by tracking the likelihood behavior of a given API call sequence. Experimental results showed that our proposed model outperforms other peer models that rely on API call sequences. Our model returns an average malware detection accuracy of 0.990, with a false positive rate of 0.010. Regarding malware mimicry, our model shows an average noteworthy accuracy of 0.993 in detecting false positives.cs
dc.language.isoencs
dc.publisherMDPIcs
dc.relation.ispartofseriesApplied Sciencescs
dc.relation.urihttp://doi.org/10.3390/app10217673cs
dc.rights© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectmalware detectioncs
dc.subjectAPI call sequencecs
dc.subjectcontextual behaviorcs
dc.subjectmalware mimicrycs
dc.titleContextual identification of Windows malware through semantic interpretation of API call sequencecs
dc.typearticlecs
dc.identifier.doi10.3390/app10217673
dc.rights.accessopenAccesscs
dc.type.versionpublishedVersioncs
dc.type.statusPeer-reviewedcs
dc.description.sourceWeb of Sciencecs
dc.description.volume10cs
dc.description.issue21cs
dc.description.firstpageart. no. 7673cs
dc.identifier.wos000589006900001


Soubory tohoto záznamu

Tento záznam se objevuje v následujících kolekcích

Zobrazit minimální záznam

© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Kromě případů, kde je uvedeno jinak, licence tohoto záznamu je © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.