Automated Malware Tagging

碩士 === 國立臺灣大學 === 資訊管理學研究所 === 107 === In recent years, the speed of malware production has grown rapidly, and the threat to individuals and businesses has increased. If we understand the attack techniques used by malware to achieve their malicious purposes, we can directly detect and defend against...

Full description

Bibliographic Details
Main Authors: Cheng-Hung Peng, 彭証鴻
Other Authors: Yea-li Sun
Format: Others
Language:zh-TW
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/zgh664
id ndltd-TW-107NTU05396016
record_format oai_dc
spelling ndltd-TW-107NTU053960162019-11-16T05:27:55Z http://ndltd.ncl.edu.tw/handle/zgh664 Automated Malware Tagging 自動化惡意程式貼標系統 Cheng-Hung Peng 彭証鴻 碩士 國立臺灣大學 資訊管理學研究所 107 In recent years, the speed of malware production has grown rapidly, and the threat to individuals and businesses has increased. If we understand the attack techniques used by malware to achieve their malicious purposes, we can directly detect and defend against malware. Although anti-virus vendors try to explain the impact and threat of malware to the security experts by labels. However, [3] pointed out that each Anti-Virus vendor has its own labeling criteria and basis, and many of them are inconsistent. According to [11], although the malware belonging to the same label, their behavior are still quite diverse. It indicates that the currently proposed label does not have a semantic explanatory power. Therefore, this thesis proposes to examine a sequence of API call invocations, and extracts a sequence of activity groups from the execution sequence. After extracting the activity groups, we refer to the attack technique under the MITRE ATT&CK framework, and give each activity group one semantic description tag, and finally get a sequence of semantic description tag. A sequence of semantic description tags can clearly show the execution intent of each stage of execution activities and the purpose of the malware, thereby providing a deep and clear description of the malicious activity of the malware family. Yea-li Sun 孫雅麗 2019 學位論文 ; thesis 88 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 資訊管理學研究所 === 107 === In recent years, the speed of malware production has grown rapidly, and the threat to individuals and businesses has increased. If we understand the attack techniques used by malware to achieve their malicious purposes, we can directly detect and defend against malware. Although anti-virus vendors try to explain the impact and threat of malware to the security experts by labels. However, [3] pointed out that each Anti-Virus vendor has its own labeling criteria and basis, and many of them are inconsistent. According to [11], although the malware belonging to the same label, their behavior are still quite diverse. It indicates that the currently proposed label does not have a semantic explanatory power. Therefore, this thesis proposes to examine a sequence of API call invocations, and extracts a sequence of activity groups from the execution sequence. After extracting the activity groups, we refer to the attack technique under the MITRE ATT&CK framework, and give each activity group one semantic description tag, and finally get a sequence of semantic description tag. A sequence of semantic description tags can clearly show the execution intent of each stage of execution activities and the purpose of the malware, thereby providing a deep and clear description of the malicious activity of the malware family.
author2 Yea-li Sun
author_facet Yea-li Sun
Cheng-Hung Peng
彭証鴻
author Cheng-Hung Peng
彭証鴻
spellingShingle Cheng-Hung Peng
彭証鴻
Automated Malware Tagging
author_sort Cheng-Hung Peng
title Automated Malware Tagging
title_short Automated Malware Tagging
title_full Automated Malware Tagging
title_fullStr Automated Malware Tagging
title_full_unstemmed Automated Malware Tagging
title_sort automated malware tagging
publishDate 2019
url http://ndltd.ncl.edu.tw/handle/zgh664
work_keys_str_mv AT chenghungpeng automatedmalwaretagging
AT péngzhènghóng automatedmalwaretagging
AT chenghungpeng zìdònghuàèyìchéngshìtiēbiāoxìtǒng
AT péngzhènghóng zìdònghuàèyìchéngshìtiēbiāoxìtǒng
_version_ 1719292313155403776