dc.contributor.author | Amer, Eslam | |
dc.contributor.author | Zelinka, Ivan | |
dc.contributor.author | El-Sappagh, Shaker | |
dc.date.accessioned | 2021-11-23T12:54:26Z | |
dc.date.available | 2021-11-23T12:54:26Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Computers & Security. 2021, vol. 110, art. no. 102449. | cs |
dc.identifier.issn | 0167-4048 | |
dc.identifier.issn | 1872-6208 | |
dc.identifier.uri | http://hdl.handle.net/10084/145719 | |
dc.description.abstract | The widespread development of the malware industry is considered the main threat to our e-society. Therefore, malware analysis should also be enriched with smart heuristic tools that recognize malicious behaviors effectively. Although the generated API calling graph rep-resentation for malicious processes encodes worthwhile information about their malicious behavior, it is pragmatically inconvenient to generate a behavior graph for each process. Therefore, we experimented with creating generic behavioral graph models that describe malicious and non-malicious processes. These behavioral models relied on the fusion of statistical, contextual, and graph mining features that capture explicit and implicit rela-tionships between API functions in the calling sequence. Our generated behavioral models proved the behavioral contrast between malicious and non-malicious calling sequences. According to that distinction, we built different relational perspective models that charac-terize processes' behaviors. To prove our approach novelty, we experimented with our ap-proach over Windows and Android platforms. Our experimentations demonstrated that our proposed system identified unseen malicious samples with high accuracy with low false -positive. In terms of detection accuracy, our model retums an average accuracy of 0.997 and 0.977 to the unseen Windows and Android malware testing samples, respectively. More -over, we proposed a new indexing method for APIs based on their contextual similarities. We also suggested a new expressive, a visualized form that renders the API calling sequence. Consequently, we introduced a confidence metric to our model classification decision. Fur-thermore, we developed a behavioral heuristic that effectively identified malicious API call sequences that were deceptive or mimicry. | cs |
dc.language.iso | en | cs |
dc.publisher | Elsevier | cs |
dc.relation.ispartofseries | Computers & Security | cs |
dc.relation.uri | https://doi.org/10.1016/j.cose.2021.102449 | cs |
dc.rights | © 2021 Elsevier Ltd. All rights reserved. | cs |
dc.subject | malware detection | cs |
dc.subject | API call sequence | cs |
dc.subject | perspective models | cs |
dc.subject | behavioral analysis | cs |
dc.subject | features’ fusion | cs |
dc.subject | sequence reformulation | cs |
dc.title | A Multi-Perspective malware detection approach through behavioral fusion of API call sequence | cs |
dc.type | article | cs |
dc.identifier.doi | 10.1016/j.cose.2021.102449 | |
dc.type.status | Peer-reviewed | cs |
dc.description.source | Web of Science | cs |
dc.description.volume | 110 | cs |
dc.description.firstpage | art. no. 102449 | cs |
dc.identifier.wos | 000703432300007 | |