4.2 Article

A Novel Approach to Detect Malware Based on API Call Sequence Analysis

Publisher

SAGE PUBLICATIONS INC
DOI: 10.1155/2015/659101

Keywords

-

Funding

  1. MSIP (Ministry of Science, ICT and Future Planning), Korea under the ITRC (Information Technology Research Center) [NIPA-2014-H0301-14-1004]
  2. ICT R&D Program of MSIP/IITP [14-912-06-002]

Ask authors/readers for more resources

In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle between ever-evolving malware and antivirus programs that need to process ever-increasing security related data. For malware detection, various approaches have been proposed. Among them, dynamic analysis is known to be effective in terms of providing behavioral information. As malware authors increasingly use obfuscation techniques, it becomes more important to monitor how malware behaves for its detection. In this paper, we propose a novel approach for dynamic analysis of malware. We adopt DNA sequence alignment algorithms and extract common API call sequence patterns of malicious function from malware in different categories. We find that certain malicious functions are commonly included in malware even in different categories. From checking the existence of certain functions or API call sequence patterns matched, we can even detect new unknown malware. The result of our experiment shows high enough F-measure and accuracy. API call sequence can be extracted from most of the modern devices; therefore, we believe that our method can detect the malware for all types of the ubiquitous devices.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Cosine similarity based anomaly detection methodology for the CAN bus

Byung Il Kwak, Mee Lan Han, Huy Kang Kim

Summary: In recent years, the advancement of vehicular technology and the increasing connectivity between vehicles and the external environment have highlighted the importance of addressing security issues. This study proposes an anomaly detection method based on cosine similarity for in-vehicle networks to detect different types of injection attacks effectively.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data

Hyun Min Song, Huy Kang Kim

Summary: The research proposes a novel self-supervised method for IVN anomaly detection using noised pseudo normal data, consisting of two deep-learning models, the generator and the detector. The method not only significantly improves in detecting unknown attacks but also outperforms other semi-supervised learning-based methods.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Automation & Control Systems

Driver Identification Based on Wavelet Transform Using Driving Patterns

Byung Il Kwak, Mee Lan Han, Huy Kang Kim

Summary: The modern automotive system integrates information and communication technologies to provide driver safety and convenience. Driver identification technology allows for personalized services such as healthcare or insurance. A driver-identification method based on wavelet transform was proposed and evaluated, showing XGBoost can achieve up to 96.18% accuracy on motorways and SVM can achieve up to 95.07% accuracy on urban roads.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Chemistry, Analytical

Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding and Thresholding Approach

Kyung Ho Park, Eunji Park, Huy Kang Kim

Summary: A fault detection model utilizing a stacked autoencoder under unsupervised learning was proposed to address the limitations of rule-based and supervised learning approaches in recognizing faults in Unmanned Aerial Vehicles. The model distinguishes safe states and faulty states through feature extraction and reconstruction loss, showing promising fault detection performance.

SENSORS (2021)

Article Computer Science, Information Systems

PF-TL: Payload Feature-Based Transfer Learning for Dealing with the Lack of Training Data

Ilok Jung, Jongin Lim, Huy Kang Kim

Summary: The study introduces payload feature-based transfer learning to address the lack of training data in applying machine learning to intrusion detection, improving accuracy by expanding information extraction range and providing an optimized method for creating labeled datasets.

ELECTRONICS (2021)

Article Computer Science, Information Systems

AutoVAS: An automated vulnerability analysis system with a deep learning approach

Sanghoon Jeon, Huy Kang Kim

Summary: With the advancement of automated hacking and analysis technologies, the researchers have proposed a deep learning-based automated vulnerability analysis system to effectively represent source code as embedding vectors, achieving lower false negative and false positive rates compared to other approaches, and successfully detecting zero-day vulnerabilities in open-source projects.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Unsupervised malicious domain detection with less labeling effort

Kyung Ho Park, Hyun Min Song, Jeong Do Yoo, Su-Youn Hong, Byoungmo Cho, Kwangsoo Kim, Huy Kang Kim

Summary: This study proposes an unsupervised malicious domain detection method using an autoencoder, which effectively discriminates benign and malicious domains by extracting significant features. The method achieves high detection performance with reduced labeling effort and can serve as a concrete baseline for future research.

COMPUTERS & SECURITY (2022)

Article Engineering, Electrical & Electronic

Intrusion Detection and Identification Using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery

Kyoung Ho Kim, Byung Il Kwak, Mee Lan Han, Huy Kang Kim

Summary: With the increasing reliance of critical infrastructures on advanced information and communication technology, there is a need to detect and identify abnormalities in the control system networks. This study proposes a machine learning-based method that can effectively detect and identify anomalies in an Oil Refinery's Distributed Control System network, achieving up to 99% accuracy.

IEEE TRANSACTIONS ON POWER SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House System

Yuseung Noh, Seonghoon Jeong, Huy Kang Kim

Summary: Due to the widespread use of smartphones, various online games based on mobile platforms are being launched. Mobile games have the advantage of better accessibility compared to PC games, but the limitation of difficult input of specific actions exists. To overcome this limitation, game companies apply autoplay systems to support users. However, even though game companies introduced an in-game economic system to prevent profit-producing activities of gold farming groups (GFGs), GFGs still operate by abusing an auction house.

IEEE TRANSACTIONS ON GAMES (2022)

Article Computer Science, Theory & Methods

TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet

Mee Lan Han, Byung Il Kwak, Huy Kang Kim

Summary: Devices that ensure vehicle and driver safety generate a substantial amount of network traffic, which is transmitted to the In-Vehicle Network (IVN) depending on the defined function. To process this traffic efficiently, an advanced network protocol like Automotive Ethernet is necessary. However, vulnerabilities can be easily inherited from established Ethernet to Automotive Ethernet. This study proposes a method for detecting and identifying abnormalities in Automotive Ethernet using wavelet transform and deep convolutional neural network, which has shown effective performance and lower time-cost compared to default methods.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Automation & Control Systems

AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks

Seonghoon Jeong, Huy Kang Kim, Mee Lan Han, Byung Il Kwak

Summary: This article proposes AERO, an automotive Ethernet real-time observer, for protecting in-vehicle networks. AERO can analyze automotive Ethernet traffic and detect anomalies, achieving high detection performance for different types of attacks.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

HMLET: Hunt Malware Using Wavelet Transform on Cross-Platform

Sangmin Park, Sanghoon Jeon, Huy Kang Kim

Summary: With the growing importance of cyberspace, malware poses threats to both individuals and countries. The circulation of numerous malware continues in cyberspace, and as technology advances, new or advanced malware emerge. Most existing malware detection models focus on single-platform, neglecting the need for cross-platform malware detection. In this study, we propose HMLET, a cross-platform malware detection model that utilizes content-based information to detect malware across different platforms. Experimental results show that HMLET achieves high-performance malware detection in the cross-platform scenario.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework

Sanghoon Jeon, Minsoo Ryu, Dongyoung Kim, Huy Kang Kim

Summary: This article introduces a system called FuzzBuilderEx, which provides an automated fuzzing environment for library testing. The system analyzes the test code using a testing framework to generate seed corpus and fuzzing executables for library fuzzing. In performance evaluation, FuzzBuilderEx shows excellent results in code coverage and crash count, and successfully detects three zero-day vulnerabilities.

IEEE ACCESS (2022)

Review Computer Science, Information Systems

Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review

Mee Lan Han, Byung Il Kwak, Huy Kang Kim

Summary: This systematic review provides an overview of significant studies on cheating behavior, countermeasures, and detection methods in MMORPGs. By examining the scope of cheating behavior and the key mechanisms of online games, it establishes a foundation for correctly managing the detection techniques and methods for cheating behavior in MMORPGs.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Panop: Mimicry-Resistant ANN-Based Distributed NIDS for IoT Networks

Hyunjun Kim, Sunwoo Ahn, Whoi Ree Ha, Hyunjae Kang, Dong Seong Kim, Huy Kang Kim, Yunheung Paek

Summary: Recent attention has been given to the use of artificial neural networks for network intrusion detection systems by security researchers. In order to meet the demand for high accuracy, ANN-based NIDSs have become more complicated and heavy, leading some researchers to propose optimized algorithms to balance detection accuracy and runtime performance.

IEEE ACCESS (2021)

No Data Available