Deakin University
Browse

Detecting unknown anomalous program behavior using API system calls

Version 2 2024-06-06, 09:57
Version 1 2011-01-01, 00:00
chapter
posted on 2024-06-06, 09:57 authored by M Islam, Morshed Chowdhury
This paper presents the detection techniques of anomalous programs based on the analysis of their system call traces. We collect the API calls for the tested executable programs from Microsoft detour system and extract the features for our classification task using the previously established n-gram technique. We propose three different feature extraction approaches in this paper. These are frequency-based, time-based and a hybrid approach which actually combines the first two approaches. We use the well-known classifier algorithms in our experiments using WEKA interface to classify the malicious programs from the benign programs. Our empirical evidence demonstrates that the proposed feature extraction approaches can detect malicious programs over 88% which is quite promising for the contemporary similar research.<br>

History

Language

eng

Publication classification

B1 Book chapter

Copyright notice

2011, Springer-Verlag Berlin Heidelberg

Extent

40

Editor/Contributor(s)

Manaf A, Sahibuddin S, Ahmad R, Daud S, El-Qawasmeh E

Chapter number

31

Pagination

383-394

ISSN

1865-0929

eISSN

1865-0937

ISBN-13

9783642254833

ISBN-10

3642254837

Publisher

Springer

Place of publication

Berlin, Germany

Title of book

Informatics engineering and information science

Series

Communications in computer and information science; v. 254

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC