Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2022

01-12-2022

Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning

Authors: R. A. Ognev, E. V. Zhukovskii, D. P. Zegzhda, A. N. Kiselev

Published in: Automatic Control and Computer Sciences | Issue 8/2022

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In current operating systems, executable files are used to solve various problems, which in turn can be either benign (perform only necessary actions) or malicious (the main purpose of which is to perform destructive actions in relation to the system). Thus, malware is a program used for unauthorized access to information and/or impact on information or resources of an automated information system. Here, the problem of determining the types of executable files and detecting malware is solved.
Literature
1.
go back to reference Idika, N. and Mathur, A.P., A survey of malware detection techniques, Purdue Univ., 2007. Idika, N. and Mathur, A.P., A survey of malware detection techniques, Purdue Univ., 2007.
6.
go back to reference Salehi, Z., Ghiasi, M., and Sami, A., A miner for malware detection based on API function calls and their arguments, The 16th CSI Int. Symp. on Artificial Intelligence and Signal Processing (AISP 2012), Shiraz, Iran, 2012, IEEE, 2012, pp. 563–568. https://doi.org/10.1109/AISP.2012.6313810 Salehi, Z., Ghiasi, M., and Sami, A., A miner for malware detection based on API function calls and their arguments, The 16th CSI Int. Symp. on Artificial Intelligence and Signal Processing (AISP 2012), Shiraz, Iran, 2012, IEEE, 2012, pp. 563–568.  https://​doi.​org/​10.​1109/​AISP.​2012.​6313810
12.
go back to reference Kalinin, M.O. and Krundyshev, V.M., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, Fifth World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021, pp. 118–122. https://doi.org/10.1109/WorldS451998.2021.9514004 Kalinin, M.O. and Krundyshev, V.M., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, Fifth World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021, pp. 118–122.  https://​doi.​org/​10.​1109/​WorldS451998.​2021.​9514004
13.
go back to reference Endgame Malware BEnchmark for Research, 2018. https://github.com/elastic/ember. Endgame Malware BEnchmark for Research, 2018. https://​github.​com/​elastic/​ember.​
14.
go back to reference O’Connel, R., Binary hashing: Motivations and algorithms, 2019. https://www.riverloopsecurity.com/blog/ 2019/11/binary-hashing-intro. Cited October 11, 2021. O’Connel, R., Binary hashing: Motivations and algorithms, 2019. https://​www.​riverloopsecurit​y.​com/​blog/​ 2019/11/binary-hashing-intro. Cited October 11, 2021.
15.
go back to reference Busygin, A. and Kalinin, M. Criterion of blockchain vulnerability to majority attack based on hashing power distribution assessment, Futuristic Trends in Network and Communication Technologies. FTNCT 2020, Singh, P.K., Veselov, G., Vyatkin, V., Pljonkin, A., Dodero, J.M., and Kumar, Y., Eds., Communications in Computer and Information Science, vol. 1395. Singapore: Springer, 2020, pp. 68–77. https://doi.org/10.1007/978-981-16-1480-4_6 Busygin, A. and Kalinin, M. Criterion of blockchain vulnerability to majority attack based on hashing power distribution assessment, Futuristic Trends in Network and Communication Technologies. FTNCT 2020, Singh, P.K., Veselov, G., Vyatkin, V., Pljonkin, A., Dodero, J.M., and Kumar, Y., Eds., Communications in Computer and Information Science, vol. 1395. Singapore: Springer, 2020, pp. 68–77. https://​doi.​org/​10.​1007/​978-981-16-1480-4_​6
16.
go back to reference Koret, J., A new control flow graph based heuristic for Diaphora, 2018. http://joxeankoret.com/blog/2018/ 11/04/new-cfg-based-heuristic-diaphora. Koret, J., A new control flow graph based heuristic for Diaphora, 2018. http://​joxeankoret.​com/​blog/​2018/​ 11/04/new-cfg-based-heuristic-diaphora.
17.
go back to reference Diaphora, 2020. https://github.com/joxeankoret/diaphora. Diaphora, 2020. https://​github.​com/​joxeankoret/​diaphora.​
18.
go back to reference An implementation of the Koret–Karamitas (KOKA) CFGs hashing algorithm, 2019. https://github.com/ j-oxeankoret/diaphora/blob/master/jkutils/graph_hashes. An implementation of the Koret–Karamitas (KOKA) CFGs hashing algorithm, 2019. https://​github.​com/​ j-oxeankoret/diaphora/blob/master/jkutils/graph_hashes.
Metadata
Title
Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning
Authors
R. A. Ognev
E. V. Zhukovskii
D. P. Zegzhda
A. N. Kiselev
Publication date
01-12-2022
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2022
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411622080120

Other articles of this Issue 8/2022

Automatic Control and Computer Sciences 8/2022 Go to the issue