4.6 Article

Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2017.2675881

Keywords

Malware detection; quantitative data flow analysis; data mining; graph mining; machine learning

Ask authors/readers for more resources

Behavior-based detection approaches commonly address the threat of statically obfuscated malware. Such approaches often use graphs to represent process or system behavior and typically employ frequency-based graph mining techniques to extract characteristic patterns from collections of malware graphs. Recent studies in the molecule mining domain suggest that frequency-based graph mining algorithms often perform sub-optimally in finding highly discriminating patterns. We propose a novel malware detection approach that uses so-called compression-based mining on quantitative data flow graphs to derive highly accurate detection models. Our evaluation on a large and diverse malware set shows that our approach outperforms frequency-based detection models in terms of detection effectiveness by more than 600 percent.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Software Engineering

Practical static analysis of context leaks in Android applications

Flavio Toffalini, Jun Sun, Martin Ochoa

SOFTWARE-PRACTICE & EXPERIENCE (2019)

Article Computer Science, Theory & Methods

Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Ivan Homoliak, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martin Ochoa

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems

Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martin Ochoa, Huaqun Guo, Unnikrishnan Cheramangalath

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications

Jesus Solano, Luis Camacho, Alejandro Correa, Claudio Deiro, Javier Vargas, Martin Ochoa

Summary: Combining fingerprinting and behavioral dynamics can enhance the security of login mechanisms. Context analysis and behavioral analysis individually achieve around 0.7 accuracy, but a combined approach can reach up to 0.9 accuracy using a linear combination of the outcomes of the single models.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2021)

Proceedings Paper Computer Science, Information Systems

Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots

Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martin Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici

PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19) (2019)

Proceedings Paper Computer Science, Information Systems

Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing

Flavio Toffalini, Martin Ochoa, Sun Jun, Jianying Zhou

PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19) (2019)

Proceedings Paper Computer Science, Information Systems

Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies

Xueou Wang, Xiaolu Hou, Ruben Rios, Per Hallgren, Nils Ole Tippenhauer, Martin Ochoa

COMPUTER SECURITY (ESORICS 2018), PT II (2018)

Proceedings Paper Computer Science, Information Systems

Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems

John H. Castellanos, Martin Ochoa, Jianying Zhou

34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018) (2018)

Proceedings Paper Computer Science, Information Systems

Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems

Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martin Ochoa, Guo Huaqun

ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018 (2018)

Proceedings Paper Computer Science, Theory & Methods

Enforcing Memory Safety in Cyber-Physical Systems

Eyasu Getahun Chekole, John Henry Castellanos, Martin Ochoa, David K. Y. Yau

COMPUTER SECURITY, 2017 (2018)

Article Computer Science, Information Systems

Assuring BetterTimes

Per Hallgren, Ravi Kishore, Martin Ochoa, Andrei Sabelfeld

JOURNAL OF COMPUTER SECURITY (2018)

Proceedings Paper Computer Science, Information Systems

Reasoning about Probabilistic Defense Mechanisms against Remote Attacks

Martin Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh

2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P) (2017)

Proceedings Paper Computer Science, Information Systems

TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition

Athul Harilal, Flavio Toffalini, John Castellanos, Juan Guarnizo, Ivan Homoliak, Martin Ochoa

PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17) (2017)

Proceedings Paper Computer Science, Theory & Methods

Generating Behavior-based Malware Detection Models with Genetic Programming

Tobias Wuechner, Martin Ochoa, Enrico Lovat, Alexander Pretschner

2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) (2016)

No Data Available