Show simple item record

dc.contributor.authorAmer, Eslam
dc.contributor.authorZelinka, Ivan
dc.contributor.authorEl-Sappagh, Shaker
dc.date.accessioned2021-11-23T12:54:26Z
dc.date.available2021-11-23T12:54:26Z
dc.date.issued2021
dc.identifier.citationComputers & Security. 2021, vol. 110, art. no. 102449.cs
dc.identifier.issn0167-4048
dc.identifier.issn1872-6208
dc.identifier.urihttp://hdl.handle.net/10084/145719
dc.description.abstractThe widespread development of the malware industry is considered the main threat to our e-society. Therefore, malware analysis should also be enriched with smart heuristic tools that recognize malicious behaviors effectively. Although the generated API calling graph rep-resentation for malicious processes encodes worthwhile information about their malicious behavior, it is pragmatically inconvenient to generate a behavior graph for each process. Therefore, we experimented with creating generic behavioral graph models that describe malicious and non-malicious processes. These behavioral models relied on the fusion of statistical, contextual, and graph mining features that capture explicit and implicit rela-tionships between API functions in the calling sequence. Our generated behavioral models proved the behavioral contrast between malicious and non-malicious calling sequences. According to that distinction, we built different relational perspective models that charac-terize processes' behaviors. To prove our approach novelty, we experimented with our ap-proach over Windows and Android platforms. Our experimentations demonstrated that our proposed system identified unseen malicious samples with high accuracy with low false -positive. In terms of detection accuracy, our model retums an average accuracy of 0.997 and 0.977 to the unseen Windows and Android malware testing samples, respectively. More -over, we proposed a new indexing method for APIs based on their contextual similarities. We also suggested a new expressive, a visualized form that renders the API calling sequence. Consequently, we introduced a confidence metric to our model classification decision. Fur-thermore, we developed a behavioral heuristic that effectively identified malicious API call sequences that were deceptive or mimicry.cs
dc.language.isoencs
dc.publisherElseviercs
dc.relation.ispartofseriesComputers & Securitycs
dc.relation.urihttps://doi.org/10.1016/j.cose.2021.102449cs
dc.rights© 2021 Elsevier Ltd. All rights reserved.cs
dc.subjectmalware detectioncs
dc.subjectAPI call sequencecs
dc.subjectperspective modelscs
dc.subjectbehavioral analysiscs
dc.subjectfeatures’ fusioncs
dc.subjectsequence reformulationcs
dc.titleA Multi-Perspective malware detection approach through behavioral fusion of API call sequencecs
dc.typearticlecs
dc.identifier.doi10.1016/j.cose.2021.102449
dc.type.statusPeer-reviewedcs
dc.description.sourceWeb of Sciencecs
dc.description.volume110cs
dc.description.firstpageart. no. 102449cs
dc.identifier.wos000703432300007


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record