Deakin University
Browse

File(s) under permanent embargo

Differentiating malware from cleanware using behavioural analysis

conference contribution
posted on 2010-01-01, 00:00 authored by Ronghua Tian, R Islam, Lynn BattenLynn Batten, S Versteeg
This paper proposes a scalable approach for distinguishing malicious files from clean files by investigating the behavioural features using logs of various API calls. We also propose, as an alternative to the traditional method of manually identifying malware files, an automated classification system using runtime features of malware files. For both projects, we use an automated tool running in a virtual environment to extract API call features from executables and apply pattern recognition algorithms and statistical methods to differentiate between files. Our experimental results, based on a dataset of 1368 malware and 456 cleanware files, provide an accuracy of over 97% in distinguishing malware from cleanware. Our techniques provide a similar accuracy for classifying malware into families. In both cases, our results outperform comparable previously published techniques.

History

Event

International Conference on Malicious and Unwanted Software (5th : 2010 : Nancy, France)

Pagination

23 - 30

Publisher

IEEE

Location

Nancy, France

Place of publication

Piscataway, N.J.

Start date

2010-10-19

End date

2010-10-20

ISBN-13

9781424493555

ISBN-10

1424493552

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2010, Institute of Electrical and Electronics Engineers (IEEE)

Title of proceedings

MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC