Abstract
Numerous metamorphic and polymorphic malicious variants are generated automatically on a daily basis by mutation engines that transform the code of a malicious program while retaining its functionality, in order to evade signature-based detection. These automatic processes have greatly increased the number of malware variants, deeming their fully-manual analysis impossible. Malware classification is the task of determining to which family a new malicious variant belongs. Variants of the same malware family show similar behavioral patterns. Thus, classifying newly discovered malicious programs and applications helps assess the risks they pose. Moreover, malware classification facilitates determining which of the newly discovered variants should undergo manual analysis by a security expert, in order to determine whether they belong to a new family (e.g., one whose members exploit a zero-day vulnerability) or are simply the result of a concept drift within a known malicious family. This motivated intense research in recent years on devising high-accuracy automatic tools for malware classification. In this work, we present DAEMON - a novel dataset-agnostic malware classifier. A key property of DAEMON is that the type of features it uses and the manner in which they are mined facilitate understanding the distinctive behavior of malware families, making its classification decisions explainable. We've optimized DAEMON using a large-scale dataset of x86 binaries, belonging to a mix of several malware families targeting computers running Windows. We then re-trained it and applied it, without any algorithmic change, feature re-engineering or parameter tuning, to two other large-scale datasets of malicious Android applications consisting of numerous malware families. DAEMON obtained highly accurate classification results on all datasets, establishing that it is also platform-agnostic.
Highlights
Traditional anti-malware software relies on signatures to uniquely identify malicious files
We describe several prior works that presented static or dynamic analysis malware classifiers and focus on those works that were evaluated on the three datasets on which we evaluated DAEMON
We evaluated it on three datasets consisting of families of malicious executables targeted to two different computing platforms: The Drebin Dataset and CICInvesAndMal2019, consisting of Android applications, and Microsoft’s Kaggle Classification Challenge dataset, consisting of Portable Executable (PE) x86 executables
Summary
Traditional anti-malware software relies on signatures to uniquely identify malicious files. These techniques transform the code of a malicious program, while retaining its functionality, in order to evade signature-based detection [1]–[4] These mechanisms for automatic malware generation caused the number of malware variants to skyrocket. Variants belong to the same malware family if they show similar behavior and attempt to exploit the same vulnerabilities This often implies that they are metamorphic/polymorphic variants of the same original malicious program. Hendler: DAEMON: Dataset/Platform-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining is the task of determining to which family a new variant belongs. We call a malware classifier platform-agnostic if it can accurately classify collections of malware executables, regardless of the platform they target, without performing any algorithmic changes or any form of feature re-engineering.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.