Using Aggregation Technology to Improve System Call Based Malware Behavior Detection
碩士 === 國立中央大學 === 資訊管理研究所 === 99 === Malware is one kind of software which has intention to attack computer systems. In recent years there has significant increase in the number of malware, in addition malware also use polymorphism, obfuscation and packing technologies to protect itself. For the abo...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/18515256366677728449 |
id |
ndltd-TW-099NCU05396091 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NCU053960912017-07-13T04:20:34Z http://ndltd.ncl.edu.tw/handle/18515256366677728449 Using Aggregation Technology to Improve System Call Based Malware Behavior Detection 以聚合技術改善系統呼叫為基礎之惡意程式行為偵測 Chien-Fu Peng 彭建福 碩士 國立中央大學 資訊管理研究所 99 Malware is one kind of software which has intention to attack computer systems. In recent years there has significant increase in the number of malware, in addition malware also use polymorphism, obfuscation and packing technologies to protect itself. For the above reason, the effect of traditional static malware detection technology is restricted, as a result in recent years many studies focused on dynamic malware detection technology. However most of the previous studies are process center oriented, which mean these studies only monitor one process’s behavior, ignoring the possibility of malware using multiple process to complete malicious intent, or control legal process to hide their malicious behavior. In this paper we propose the use of dependency structure matrix to record the behavior of all process in user’s system and also propose an algorithm to detect multiple process’s self-replication and survival behavior, find the relations of the system processes by using the aggregation technology to improve the detection rate of traditional dynamic malware detection. As an evaluation of our proposes system. We execute the malware samples in the virtual machine and using process monitor tool to recorded system processes, and then detect whether our system can detect the malware or not. Experimental results show that we can detect 11% malware used the multiple processes to complete malicious intent in the 140 malware samples, and improve the weakness of previous studies which must used white list to avoid false positive. Yi-Ming Chen 陳奕明 2011 學位論文 ; thesis 63 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊管理研究所 === 99 === Malware is one kind of software which has intention to attack computer systems. In recent years there has significant increase in the number of malware, in addition malware also use polymorphism, obfuscation and packing technologies to protect itself. For the above reason, the effect of traditional static malware detection technology is restricted, as a result in recent years many studies focused on dynamic malware detection technology. However most of the previous studies are process center oriented, which mean these studies only monitor one process’s behavior, ignoring the possibility of malware using multiple process to complete malicious intent, or control legal process to hide their malicious behavior. In this paper we propose the use of dependency structure matrix to record the behavior of all process in user’s system and also propose an algorithm to detect multiple process’s self-replication and survival behavior, find the relations of the system processes by using the aggregation technology to improve the detection rate of traditional dynamic malware detection. As an evaluation of our proposes system. We execute the malware samples in the virtual machine and using process monitor tool to recorded system processes, and then detect whether our system can detect the malware or not. Experimental results show that we can detect 11% malware used the multiple processes to complete malicious intent in the 140 malware samples, and improve the weakness of previous studies which must used white list to avoid false positive.
|
author2 |
Yi-Ming Chen |
author_facet |
Yi-Ming Chen Chien-Fu Peng 彭建福 |
author |
Chien-Fu Peng 彭建福 |
spellingShingle |
Chien-Fu Peng 彭建福 Using Aggregation Technology to Improve System Call Based Malware Behavior Detection |
author_sort |
Chien-Fu Peng |
title |
Using Aggregation Technology to Improve System Call Based Malware Behavior Detection |
title_short |
Using Aggregation Technology to Improve System Call Based Malware Behavior Detection |
title_full |
Using Aggregation Technology to Improve System Call Based Malware Behavior Detection |
title_fullStr |
Using Aggregation Technology to Improve System Call Based Malware Behavior Detection |
title_full_unstemmed |
Using Aggregation Technology to Improve System Call Based Malware Behavior Detection |
title_sort |
using aggregation technology to improve system call based malware behavior detection |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/18515256366677728449 |
work_keys_str_mv |
AT chienfupeng usingaggregationtechnologytoimprovesystemcallbasedmalwarebehaviordetection AT péngjiànfú usingaggregationtechnologytoimprovesystemcallbasedmalwarebehaviordetection AT chienfupeng yǐjùhéjìshùgǎishànxìtǒnghūjiàowèijīchǔzhīèyìchéngshìxíngwèizhēncè AT péngjiànfú yǐjùhéjìshùgǎishànxìtǒnghūjiàowèijīchǔzhīèyìchéngshìxíngwèizhēncè |
_version_ |
1718495414153379840 |