An automated classification system based on the strings of trojan and virus families
Tian, Ronghua, Batten, Lynn, Islam, Rafiqul and Versteeg, Steve 2009, An automated classification system based on the strings of trojan and virus families, in MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, IEEE, New York, N.Y., pp. 23-30.
(Some files may be inaccessible until you login with your Deakin Research Online credentials)
Classifying malware correctly is an important research issue for anti-malware software producers. This paper presents an effective and efficient malware classification technique based on string information using several wellknown classification algorithms. In our testing we extracted the printable strings from 1367 samples, including unpacked trojans and viruses and clean files. Information describing the printable strings contained in each sample was input to various classification algorithms, including treebased classifiers, a nearest neighbour algorithm, statistical algorithms and AdaBoost. Using k-fold cross validation on the unpacked malware and clean files, we achieved a classification accuracy of 97%. Our results reveal that strings from library code (rather than malicious code itself) can be utilised to distinguish different malware families.
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Field of Research
080403 Data Structures
Socio Economic Objective
890205 Information Processing Services (incl. Data Entry and Capture)
Unless expressly stated otherwise, the copyright for items in Deakin Research Online is owned by the author, with all rights reserved.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO.
If you believe that your rights have been infringed by this repository, please contact firstname.lastname@example.org.