Skip to main content

Characterising Malicious Software with High-Level Behavioural Patterns

  • Conference paper
  • First Online:
SOFSEM 2017: Theory and Practice of Computer Science (SOFSEM 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10139))

  • 1185 Accesses

Abstract

Current research trends concerning malicious software indicate preferring malware behaviour over malware structure analysis. Detection is heading to methods employing malware models on higher level of abstraction, not purely on the level of program’s code. Specification of applicable level of abstraction for investigation and detection of malware may present a serious challenge. Many approaches claim using high-level abstraction of malware behaviour but they are still based on sequences of instructions which form the malicious program. Techniques which rely on syntactic representation potentially fail whenever malware writers employ mutation or obfuscation of malicious code. Our work presents a different strategy. We utilised freely available information about malicious programs which were already inspected and tried to find patterns in malware behaviour, which are not bound to syntactic representation of malicious samples and so should withstand malware mutation on the syntactic level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.shadowserver.org/wiki/pmwiki.php/Stats/Malware.

  2. 2.

    Data obtained 01/08/2016.

  3. 3.

    https://www.shadowserver.org/wiki/pmwiki.php/Stats/PackerStatistics.

  4. 4.

    https://www.jetbrains.com/datagrip/.

  5. 5.

    We avoid stating the real signature label because disclosing such details may negatively influence employability of presented behavioural patterns in potential detection mechanisms.

References

  1. Alam, S., Horspool, R., Traore, I.: MARD: A framework for metamorphic malware analysis and real-time detection. In: IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 480–489 (2014)

    Google Scholar 

  2. Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178–197. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74320-0_10

    Chapter  Google Scholar 

  3. Bayer, U., Habibi, I., Balzarotti, D., Kirda, E., Kruegel, C.: A view on current malware behaviors. In: Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET’09, p. 8. USENIX Association, Berkeley (2009)

    Google Scholar 

  4. Cymru: totalhash (2016). https://totalhash.cymru.com/

  5. Ding, Y., Yuan, X., Tang, K., Xiao, X., Zhang, Y.: A fast malware detection algorithm based on objective-oriented association mining. Comput. Secur. 39, 315–324 (2013). Part B(0)

    Google Scholar 

  6. Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2), 6:1–6:42 (2008)

    Google Scholar 

  7. Gregio, A., Bonacin, R., Nabuco, O., Monte Afonso, V., Licio De Geus, P., Jino, M.: Ontology for malware behavior: A core model proposal. In: IEEE 23rd International WETICE Conference (WETICE) 2014, pp. 453–458, June 2014

    Google Scholar 

  8. Lu, H., Wang, X., Zhao, B., Wang, F., Su, J.: Endmal: an anti-obfuscation and collaborative malware detection system using syscall sequences. Math. Comput. Model. 58(5–6), 1140–1154 (2013)

    Article  Google Scholar 

  9. Mohd Shaid, S., Maarof, M.: Malware behavior image for malware variant identification. In: International Symposium on Biometrics and Security Technologies (ISBAST) 2014, pp. 238–243 (2014)

    Google Scholar 

  10. Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: IEEE Symposium on Security and Privacy 2007, pp. 231–245 (2007)

    Google Scholar 

  11. Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: Semantic Technologies for Intelligence, Defense, and Security (STIDS), CEUR Workshop Proceedings, vol. 96, pp. 49–56 (2012)

    Google Scholar 

  12. Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108–125. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70542-0_6

    Chapter  Google Scholar 

  13. Song, F., Touili, T.: Pushdown model checking for malware detection. STTT 16(2), 147–173 (2014)

    Article  MATH  Google Scholar 

  14. Stastna, J., Tomasek, M.: Exploring malware behaviour for improvement of malware signatures. In: IEEE 13th International Scientific Conference on Informatics 2015, pp. 275–280 (2015)

    Google Scholar 

  15. Wagener, G., State, R., Dulaunoy, A.: Malware behaviour analysis. J. Comput. Virol. 4(4), 279–287 (2008)

    Article  Google Scholar 

  16. Wu, L., Ping, R., Ke, L., Hai-xin, D.: Behavior-based malware analysis and detection. In: First International Workshop on Complexity and Data Mining (IWCDM) 2011, pp. 39–42. IEEE (2011)

    Google Scholar 

  17. Yuxin, D., Xuebing, Y., Di, Z., Li, D., Zhanchao, A.: Feature representation and selection in malicious code detection methods based on static system calls. Comput. Secur. 30(6–7), 514–524 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

This work has been supported by the Slovak Research and Development Agency under the contract No. APVV-15-0055, and Grant No. FEI-2015-18: Coalgebraic models of component systems.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jana Št’astná .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Št’astná, J., Tomášek, M. (2017). Characterising Malicious Software with High-Level Behavioural Patterns. In: Steffen, B., Baier, C., van den Brand, M., Eder, J., Hinchey, M., Margaria, T. (eds) SOFSEM 2017: Theory and Practice of Computer Science. SOFSEM 2017. Lecture Notes in Computer Science(), vol 10139. Springer, Cham. https://doi.org/10.1007/978-3-319-51963-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51963-0_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51962-3

  • Online ISBN: 978-3-319-51963-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics