4.5 Article

MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics

Journal

COMPUTERS & SECURITY
Volume 83, Issue -, Pages 208-233

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2019.02.007

Keywords

Malware; Malicious behavior types; API call sequence; Behavioral differences; Behavioral correlation

Funding

  1. National Key Research & Development Program of China [2016QY06X1205]

Ask authors/readers for more resources

It is a wide-spread way to detect malware by analyzing its behavioral characteristics based on API call sequences. However, previous studies usually just focus on its static or dynamic API call sequence, while neglecting the correlation between them. Our experimental results show that there exists an underlying relation between the dynamic and static API call sequences of malware. The relation can be described as the syntax is different, but the semantics is similar. Based on this discovery, this paper first attempts to explore the difference and relation between the static and dynamic API sequences of malicious programs. We correlate and fuse their dynamic and static API sequences into one hybrid sequence based on semantics mapping and then construct the hybrid feature vector space. Furthermore, we mine and define the malicious behavior types of the programs, and provide explainable results for malware detection. Our study has addressed the shortcoming of the previous approaches that they usually pay attention to detection but neglect explanation. By correlation and fusion of the static and dynamic API sequences, we establish an explainable malware detection framework, called MalDAE. The evaluation results show that the detection and classification accuracy of MalDAE can reach up to 97.89% and 94.39% respectively outperforming the previous similar studies by comprehensive comparison. In addition, MalDAE gives an understandable explanation for common types of malware and provides predictive support for understanding and resisting malware. (C) 2019 The Authors. Published by Elsevier Ltd.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Malware Visualization for Fine-Grained Classification

Jianwen Fu, Jingfeng Xue, Yong Wang, Zhenyan Liu, Chun Shan

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine

Weijie Han, Jingfeng Xue, Hui Yan

IET INFORMATION SECURITY (2019)

Article Computer Science, Hardware & Architecture

MalInsight: A systematic profiling based malware detection framework

Weijie Han, Jingfeng Xue, Yong Wang, Zhenyan Liu, Zixiao Kong

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework

Weijie Han, Jingfeng Xue, Yong Wang, Fuquan Zhang, Xianwei Gao

Summary: This paper proposes a novel framework for detecting and understanding APT malware, which leverages system call information and ontology knowledge. The framework accurately detects and clusters APT malware, providing systematic cognition and contextual understanding, with evaluation results showing high accuracy rates.

INFORMATION SCIENCES (2021)

Review Computer Science, Information Systems

A Survey on Adversarial Attack in the Age of Artificial Intelligence

Zixiao Kong, Jingfeng Xue, Yong Wang, Lu Huang, Zequn Niu, Feng Li

Summary: This article discusses the importance and methods of adversarial attack security, helping researchers understand how to enter this field for research. It focuses on the classification and methods of adversarial attacks on images, texts, and malicious code.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA)

Zequn Niu, Wenjie Guo, Jingfeng Xue, Yong Wang, Zixiao Kong, Lu Huang

Summary: This work proposed a novel anomaly detection approach based on ensemble semi-supervised active learning, which can effectively detect anomalous traffic when there is few labeled samples and the dataset is unbalanced. By using a balanced sampling strategy, a balanced training set is constructed to effectively train the detection model on a limited budget.

COMPUTERS & SECURITY (2023)

Article Computer Science, Artificial Intelligence

Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications

Junbao Chen, Jingfeng Xue, Yong Wang, Lu Huang, Thar Baker, Zhixiong Zhou

Summary: This paper proposes a Privacy-Preserving and Traceable Federated Learning framework (PPTFL) that protects privacy through Hierarchical Aggregation Federated Learning and combines federated learning with blockchain and IPFS for traceability and tamper-proofing of parameters.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Computer Science, Information Systems

Black-Box Evasion Attack Method Based on Confidence Score of Benign Samples

Shaohan Wu, Jingfeng Xue, Yong Wang, Zixiao Kong

Summary: Recently, deep learning-based malware detection models have replaced manual analysis as the primary defense for anti-malware systems. However, these models are vulnerable to adversarial examples, which can evade detection by adding carefully crafted perturbations to malicious samples. We propose a method that extracts benign payload from benign samples based on detection results and uses an RNN generative model to learn benign features. By generating adversarial perturbations and appending them to the malicious samples, we achieve a maximum evasion success rate of 90.8% under different scenarios.

ELECTRONICS (2023)

Article Computer Science, Information Systems

NACDA: Naming-Based Access Control and Decentralized Authorization for Secure Many-to-Many Data Sharing

Minghui Li, Jingfeng Xue, Yong Wang, Rui Ma, Wei Huo

Summary: The rapid development of wearable technology has enabled the collection and sharing of health data, providing benefits to patients, caretakers, and medical research. However, the sensitive nature of personal health data and the unknown recipients pose challenges for secure sharing. This paper introduces NACDA, a secure many-to-many data-sharing service on the Named Data Network (NDN), which utilizes Identity-Based Encryption with Wildcard Key Derivation (WKD-IBE) and blockchain to ensure secure and flexible data sharing, data ownership, and access control. A prototype based on NDN is developed and a security analysis is conducted to demonstrate the feasibility of NACDA.

ELECTRONICS (2023)

Review Computer Science, Information Systems

Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly

Weijie Han, Jingfeng Xue, Yong Wang, Shibing Zhu, Zixiao Kong

IEEE ACCESS (2019)

Proceedings Paper Automation & Control Systems

Review about Software Defined Networking

Han Wei-Jie, Xue Jing-Feng

PROCEEDINGS OF THE 2017 6TH INTERNATIONAL CONFERENCE ON MEASUREMENT, INSTRUMENTATION AND AUTOMATION (ICMIA 2017) (2017)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)