A Multi-Perspective malware detection approach through behavioral fusion of API call sequence

dc.contributor.authorAmer, Eslam
dc.contributor.authorZelinka, Ivan
dc.contributor.authorEl-Sappagh, Shaker
dc.date.accessioned2021-11-23T12:54:26Z
dc.date.available2021-11-23T12:54:26Z
dc.date.issued2021
dc.description.abstractThe widespread development of the malware industry is considered the main threat to our e-society. Therefore, malware analysis should also be enriched with smart heuristic tools that recognize malicious behaviors effectively. Although the generated API calling graph rep-resentation for malicious processes encodes worthwhile information about their malicious behavior, it is pragmatically inconvenient to generate a behavior graph for each process. Therefore, we experimented with creating generic behavioral graph models that describe malicious and non-malicious processes. These behavioral models relied on the fusion of statistical, contextual, and graph mining features that capture explicit and implicit rela-tionships between API functions in the calling sequence. Our generated behavioral models proved the behavioral contrast between malicious and non-malicious calling sequences. According to that distinction, we built different relational perspective models that charac-terize processes' behaviors. To prove our approach novelty, we experimented with our ap-proach over Windows and Android platforms. Our experimentations demonstrated that our proposed system identified unseen malicious samples with high accuracy with low false -positive. In terms of detection accuracy, our model retums an average accuracy of 0.997 and 0.977 to the unseen Windows and Android malware testing samples, respectively. More -over, we proposed a new indexing method for APIs based on their contextual similarities. We also suggested a new expressive, a visualized form that renders the API calling sequence. Consequently, we introduced a confidence metric to our model classification decision. Fur-thermore, we developed a behavioral heuristic that effectively identified malicious API call sequences that were deceptive or mimicry.cs
dc.description.firstpageart. no. 102449cs
dc.description.sourceWeb of Sciencecs
dc.description.volume110cs
dc.identifier.citationComputers & Security. 2021, vol. 110, art. no. 102449.cs
dc.identifier.doi10.1016/j.cose.2021.102449
dc.identifier.issn0167-4048
dc.identifier.issn1872-6208
dc.identifier.urihttp://hdl.handle.net/10084/145719
dc.identifier.wos000703432300007
dc.language.isoencs
dc.publisherElseviercs
dc.relation.ispartofseriesComputers & Securitycs
dc.relation.urihttps://doi.org/10.1016/j.cose.2021.102449cs
dc.rights© 2021 Elsevier Ltd. All rights reserved.cs
dc.subjectmalware detectioncs
dc.subjectAPI call sequencecs
dc.subjectperspective modelscs
dc.subjectbehavioral analysiscs
dc.subjectfeatures’ fusioncs
dc.subjectsequence reformulationcs
dc.titleA Multi-Perspective malware detection approach through behavioral fusion of API call sequencecs
dc.typearticlecs
dc.type.statusPeer-reviewedcs

Files

License bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
license.txt
Size:
718 B
Format:
Item-specific license agreed upon to submission
Description: