Openly accessible

Classification of malware based on string and function feature selection

Islam, Rafiqul, Tian, Ronghua, Batten, Lynn and Versteeg, Steve 2010, Classification of malware based on string and function feature selection, in CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, IEEE, Piscataway, N.J., pp. 9-17.

Attached Files
Name Description MIMEType Size Downloads
islam-classificationofmalware-2010.pdf Published version application/pdf 443.79KB 52

Title Classification of malware based on string and function feature selection
Author(s) Islam, Rafiqul
Tian, Ronghua
Batten, Lynn
Versteeg, Steve
Conference name Cybercrime and Trustworthy Computing. Workshop (2nd : 2010 : Ballarat, Victoria)
Conference location Ballarat, Victoria
Conference dates 19-20 Jul. 2010
Title of proceedings CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010
Editor(s) [Unknown]
Publication date 2010
Conference series Cybercrime and Trustworthy Computing Workshop
Start page 9
End page 17
Total pages 9
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) malware
classification
string
function length
Summary

Anti-malware software producers are continually challenged to identify and counter new malware as it is released into the wild. A dramatic increase in malware production in recent years has rendered the conventional method of manually determining a signature for each new malware sample untenable. This paper presents a scalable, automated approach for detecting and classifying malware by using pattern recognition algorithms and statistical methods at various stages of the malware analysis life cycle. Our framework combines the static features of function length and printable string information extracted from malware samples into a single test which gives classification results better than those achieved by using either feature individually. In our testing we input feature information from close to 1400 unpacked malware samples to a number of different classification algorithms. Using k-fold cross validation on the malware, which includes Trojans and viruses, along with 151 clean files, we achieve an overall classification accuracy of over 98%.

ISBN 9780769541860
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 890206 Internet Hosting Services (incl. Application Hosting Services)
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2010
Copyright notice ©2010, Institute of Electrical and Electronics Engineers (IEEE)
Persistent URL http://hdl.handle.net/10536/DRO/DU:30033826

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 205 Abstract Views, 62 File Downloads  -  Detailed Statistics
Created: Wed, 13 Apr 2011, 11:53:27 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.