Automated Malware Tagging
碩士 === 國立臺灣大學 === 資訊管理學研究所 === 107 === In recent years, the speed of malware production has grown rapidly, and the threat to individuals and businesses has increased. If we understand the attack techniques used by malware to achieve their malicious purposes, we can directly detect and defend against...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/zgh664 |
id |
ndltd-TW-107NTU05396016 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107NTU053960162019-11-16T05:27:55Z http://ndltd.ncl.edu.tw/handle/zgh664 Automated Malware Tagging 自動化惡意程式貼標系統 Cheng-Hung Peng 彭証鴻 碩士 國立臺灣大學 資訊管理學研究所 107 In recent years, the speed of malware production has grown rapidly, and the threat to individuals and businesses has increased. If we understand the attack techniques used by malware to achieve their malicious purposes, we can directly detect and defend against malware. Although anti-virus vendors try to explain the impact and threat of malware to the security experts by labels. However, [3] pointed out that each Anti-Virus vendor has its own labeling criteria and basis, and many of them are inconsistent. According to [11], although the malware belonging to the same label, their behavior are still quite diverse. It indicates that the currently proposed label does not have a semantic explanatory power. Therefore, this thesis proposes to examine a sequence of API call invocations, and extracts a sequence of activity groups from the execution sequence. After extracting the activity groups, we refer to the attack technique under the MITRE ATT&CK framework, and give each activity group one semantic description tag, and finally get a sequence of semantic description tag. A sequence of semantic description tags can clearly show the execution intent of each stage of execution activities and the purpose of the malware, thereby providing a deep and clear description of the malicious activity of the malware family. Yea-li Sun 孫雅麗 2019 學位論文 ; thesis 88 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 資訊管理學研究所 === 107 === In recent years, the speed of malware production has grown rapidly, and the threat to individuals and businesses has increased. If we understand the attack techniques used by malware to achieve their malicious purposes, we can directly detect and defend against malware.
Although anti-virus vendors try to explain the impact and threat of malware to the security experts by labels. However, [3] pointed out that each Anti-Virus vendor has its own labeling criteria and basis, and many of them are inconsistent. According to [11], although the malware belonging to the same label, their behavior are still quite diverse. It indicates that the currently proposed label does not have a semantic explanatory power.
Therefore, this thesis proposes to examine a sequence of API call invocations, and extracts a sequence of activity groups from the execution sequence.
After extracting the activity groups, we refer to the attack technique under the MITRE ATT&CK framework, and give each activity group one semantic description tag, and finally get a sequence of semantic description tag. A sequence of semantic description tags can clearly show the execution intent of each stage of execution activities and the purpose of the malware, thereby providing a deep and clear description of the malicious activity of the malware family.
|
author2 |
Yea-li Sun |
author_facet |
Yea-li Sun Cheng-Hung Peng 彭証鴻 |
author |
Cheng-Hung Peng 彭証鴻 |
spellingShingle |
Cheng-Hung Peng 彭証鴻 Automated Malware Tagging |
author_sort |
Cheng-Hung Peng |
title |
Automated Malware Tagging |
title_short |
Automated Malware Tagging |
title_full |
Automated Malware Tagging |
title_fullStr |
Automated Malware Tagging |
title_full_unstemmed |
Automated Malware Tagging |
title_sort |
automated malware tagging |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/zgh664 |
work_keys_str_mv |
AT chenghungpeng automatedmalwaretagging AT péngzhènghóng automatedmalwaretagging AT chenghungpeng zìdònghuàèyìchéngshìtiēbiāoxìtǒng AT péngzhènghóng zìdònghuàèyìchéngshìtiēbiāoxìtǒng |
_version_ |
1719292313155403776 |