Version 2 2024-06-06, 09:57Version 2 2024-06-06, 09:57
Version 1 2011-01-01, 00:00Version 1 2011-01-01, 00:00
chapter
posted on 2024-06-06, 09:57authored byM Islam, Morshed Chowdhury
This paper presents the detection techniques of anomalous programs based on the analysis of their system call traces. We collect the API calls for the tested executable programs from Microsoft detour system and extract the features for our classification task using the previously established n-gram technique. We propose three different feature extraction approaches in this paper. These are frequency-based, time-based and a hybrid approach which actually combines the first two approaches. We use the well-known classifier algorithms in our experiments using WEKA interface to classify the malicious programs from the benign programs. Our empirical evidence demonstrates that the proposed feature extraction approaches can detect malicious programs over 88% which is quite promising for the contemporary similar research.<br>
History
Language
eng
Publication classification
B1 Book chapter
Copyright notice
2011, Springer-Verlag Berlin Heidelberg
Extent
40
Editor/Contributor(s)
Manaf A, Sahibuddin S, Ahmad R, Daud S, El-Qawasmeh E
Chapter number
31
Pagination
383-394
ISSN
1865-0929
eISSN
1865-0937
ISBN-13
9783642254833
ISBN-10
3642254837
Publisher
Springer
Place of publication
Berlin, Germany
Title of book
Informatics engineering and information science
Series
Communications in computer and information science; v. 254