A miner for malware detection based on API function calls and their arguments

Since signature based methods cannot identify sophisticated malware quickly and effectively, research is moving toward using samples' runtime behavior. But these methods are often slow and have lower detection rate and are not usually used in antivirus software. In this article we introduce a s...

Full description

Saved in:
Bibliographic Details
Published in2012 16th CSI International Symposium on Artificial Intelligence and Signal Processing pp. 563 - 568
Main Authors Salehi, Z., Ghiasi, M., Sami, A.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.05.2012
Subjects
Online AccessGet full text
ISBN9781467314787
1467314781
DOI10.1109/AISP.2012.6313810

Cover

More Information
Summary:Since signature based methods cannot identify sophisticated malware quickly and effectively, research is moving toward using samples' runtime behavior. But these methods are often slow and have lower detection rate and are not usually used in antivirus software. In this article we introduce a scalable method that relies on utilizing features other than traditional API calls to obtain higher accuracies. Two feature categories including API names and a combination of API names and their input arguments were extracted to investigate their effect in identifying and distinguishing malware and benign applications. Feature selection techniques are then applied to reduce the number of features and enhance the analysis time. Various classifiers were then utilized along with 10-fold cross validation approach to achieve an accuracy of 98.4% with a false positive rate less than two percent in best case. The small number of extracted features in the proposed technique and the high accuracy achieved makes it an appropriate approach to be used in industrial applications.
ISBN:9781467314787
1467314781
DOI:10.1109/AISP.2012.6313810