Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2022

01.12.2022

Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning

verfasst von: R. A. Ognev, E. V. Zhukovskii, D. P. Zegzhda, A. N. Kiselev

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2022

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In current operating systems, executable files are used to solve various problems, which in turn can be either benign (perform only necessary actions) or malicious (the main purpose of which is to perform destructive actions in relation to the system). Thus, malware is a program used for unauthorized access to information and/or impact on information or resources of an automated information system. Here, the problem of determining the types of executable files and detecting malware is solved.
Literatur
1.
Zurück zum Zitat Idika, N. and Mathur, A.P., A survey of malware detection techniques, Purdue Univ., 2007. Idika, N. and Mathur, A.P., A survey of malware detection techniques, Purdue Univ., 2007.
6.
Zurück zum Zitat Salehi, Z., Ghiasi, M., and Sami, A., A miner for malware detection based on API function calls and their arguments, The 16th CSI Int. Symp. on Artificial Intelligence and Signal Processing (AISP 2012), Shiraz, Iran, 2012, IEEE, 2012, pp. 563–568. https://doi.org/10.1109/AISP.2012.6313810 Salehi, Z., Ghiasi, M., and Sami, A., A miner for malware detection based on API function calls and their arguments, The 16th CSI Int. Symp. on Artificial Intelligence and Signal Processing (AISP 2012), Shiraz, Iran, 2012, IEEE, 2012, pp. 563–568.  https://​doi.​org/​10.​1109/​AISP.​2012.​6313810
12.
Zurück zum Zitat Kalinin, M.O. and Krundyshev, V.M., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, Fifth World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021, pp. 118–122. https://doi.org/10.1109/WorldS451998.2021.9514004 Kalinin, M.O. and Krundyshev, V.M., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, Fifth World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021, pp. 118–122.  https://​doi.​org/​10.​1109/​WorldS451998.​2021.​9514004
13.
Zurück zum Zitat Endgame Malware BEnchmark for Research, 2018. https://github.com/elastic/ember. Endgame Malware BEnchmark for Research, 2018. https://​github.​com/​elastic/​ember.​
14.
Zurück zum Zitat O’Connel, R., Binary hashing: Motivations and algorithms, 2019. https://www.riverloopsecurity.com/blog/ 2019/11/binary-hashing-intro. Cited October 11, 2021. O’Connel, R., Binary hashing: Motivations and algorithms, 2019. https://​www.​riverloopsecurit​y.​com/​blog/​ 2019/11/binary-hashing-intro. Cited October 11, 2021.
15.
Zurück zum Zitat Busygin, A. and Kalinin, M. Criterion of blockchain vulnerability to majority attack based on hashing power distribution assessment, Futuristic Trends in Network and Communication Technologies. FTNCT 2020, Singh, P.K., Veselov, G., Vyatkin, V., Pljonkin, A., Dodero, J.M., and Kumar, Y., Eds., Communications in Computer and Information Science, vol. 1395. Singapore: Springer, 2020, pp. 68–77. https://doi.org/10.1007/978-981-16-1480-4_6 Busygin, A. and Kalinin, M. Criterion of blockchain vulnerability to majority attack based on hashing power distribution assessment, Futuristic Trends in Network and Communication Technologies. FTNCT 2020, Singh, P.K., Veselov, G., Vyatkin, V., Pljonkin, A., Dodero, J.M., and Kumar, Y., Eds., Communications in Computer and Information Science, vol. 1395. Singapore: Springer, 2020, pp. 68–77. https://​doi.​org/​10.​1007/​978-981-16-1480-4_​6
16.
Zurück zum Zitat Koret, J., A new control flow graph based heuristic for Diaphora, 2018. http://joxeankoret.com/blog/2018/ 11/04/new-cfg-based-heuristic-diaphora. Koret, J., A new control flow graph based heuristic for Diaphora, 2018. http://​joxeankoret.​com/​blog/​2018/​ 11/04/new-cfg-based-heuristic-diaphora.
17.
Zurück zum Zitat Diaphora, 2020. https://github.com/joxeankoret/diaphora. Diaphora, 2020. https://​github.​com/​joxeankoret/​diaphora.​
18.
Zurück zum Zitat An implementation of the Koret–Karamitas (KOKA) CFGs hashing algorithm, 2019. https://github.com/ j-oxeankoret/diaphora/blob/master/jkutils/graph_hashes. An implementation of the Koret–Karamitas (KOKA) CFGs hashing algorithm, 2019. https://​github.​com/​ j-oxeankoret/diaphora/blob/master/jkutils/graph_hashes.
Metadaten
Titel
Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning
verfasst von
R. A. Ognev
E. V. Zhukovskii
D. P. Zegzhda
A. N. Kiselev
Publikationsdatum
01.12.2022
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2022
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411622080120

Weitere Artikel der Ausgabe 8/2022

Automatic Control and Computer Sciences 8/2022 Zur Ausgabe

Neuer Inhalt