Affiliation:
1. College of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China
2. DBAPPSecurity Co., Ltd., Hangzhou 310051, China
Abstract
Due to the rapid development and widespread presence of malware, deep-learning-based malware detection methods have become a pivotal approach used by researchers to protect private data. Behavior-based malware detection is effective, but changes in the running environment and malware evolution can alter API calls used for detection. Most existing methods ignore API call parameters while analyzing them separately, which loses important semantic information. Therefore, considering API call parameters and their combinations can improve behavior-based malware detection. To improve the effectiveness of behavior-based malware detection systems, this paper proposes a novel API feature engineering method. The proposed method employs parameter-augmented semantic chains to improve the system’s resilience to unknown parameters and elevate the detection rate. The method entails semantically decomposing the API to derive a behavior semantic chain, which provides an initial representation of the behavior exhibited by samples. To further refine the accuracy of the behavior semantic chain in depicting the behavior, the proposed method integrates the parameters utilized by the API into the aforementioned semantic chain. Furthermore, an information compression technique is employed to minimize the loss of critical actions following truncation of API sequences. Finally, a deep learning model consisting of gated CNN, Bi-LSTM, and an attention mechanism is used to extract semantic features embedded within the API sequences and improve the overall detection accuracy. Additionally, we evaluate the proposed method on a competition dataset Datacon2019. Experiments indicate that the proposed method outperforms baselines employing vocabulary-based methods in both robustness to unknown parameters and detection rate.
Funder
Key Technology Research and Development Program of Zhejiang Province
General Research Program of the Department of Education
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference33 articles.
1. AV-TEST (2022, December 01). AV-TEST Report. Available online: https://www.av-test.org/en/statistics/malware/.
2. N-grams-based file signatures for malware detection;Santos;International Conference on Enterprise Information Systems,2009
3. Griffin, K., Schneider, S., Hu, X., and Chiueh, T.C. (2009, January 23–25). Automatic generation of string signatures for malware detection. Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Saint-Malo, France.
4. You, I., and Yim, K. (2010, January 4–6). Malware obfuscation techniques: A brief survey. Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, Japan.
5. Bilge, L., and Dumitraş, T. (2012, January 16–18). Before we knew it: An empirical study of zero-day attacks in the real world. Proceedings of the 2012 ACM conference on Computer and Communications Security, Raleigh, NC, USA.