A novel malware clustering method using frequency of function call traces in parallel threads

13Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

With the rapid development and proliferation of the Internet, cyber attacks are increasingly and continually emerging and evolving nowadays. Malware - a generic term for computer viruses, worms, trojan horses, spywares, adwares, and bots - is a particularly lethal security threat. To cope with this security threat appropriately, we need to identify the malwares' tendency/characteristic and analyze the malwares' behaviors including their classification. In the previous works of classification technologies, the malwares have been classified by using data from dynamic analysis or code analysis. However, the works have not been succeeded to obtain efficient classification with high accuracy. In this paper, we propose a new classification method to cluster malware more effectively and more accurately. We firstly perform dynamic analysis to automatically obtain the execution traces of malwares. Then, we classify malwares into some clusters using their characteristics of the behavior that are derived from Windows API calls in parallel threads. We evaluated our classification method using 2, 312 malware samples with different hash values. The samples classified into 1, 221 groups by the result of three types of antivirus softwares were classified into 93 clusters. 90% of the samples used in the experiment were classified into 20 clusters at most. Moreover, it ensured that 39 malware samples had characteristics different from other samples, suggesting that these may be new types of malware. The kinds of Windows API calls confirmed the samples classified into the same cluster had the same characteristics. We made clear that antivirus softwares named different name to malwares that have same behavior. Copyright © 2011 The Institute of Electronics, Information and Communication Engineers.

Cite

CITATION STYLE

APA

Nakazato, J., Song, J., Eto, M., Inoue, D., & Nakao, K. (2011). A novel malware clustering method using frequency of function call traces in parallel threads. IEICE Transactions on Information and Systems, E94-D(11), 2150–2158. https://doi.org/10.1587/transinf.E94.D.2150

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free