Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis

15Citations
Citations of this article
51Readers
Mendeley users who have this article in their library.

Abstract

The YARA rules technique is used in cybersecurity to scan for malware, often in its default form, where rules are created either manually or automatically. Creating YARA rules that enable analysts to label files as suspected malware is a highly technical skill, requiring expertise in cybersecurity. Therefore, in cases where rules are either created manually or automatically, it is desirable to improve both the performance and detection outcomes of the process. In this paper, two methods are proposed utilising the techniques of fuzzy hashing and fuzzy rules, to increase the effectiveness of YARA rules without escalating the complexity and overheads associated with YARA rules. The first proposed method utilises fuzzy hashing referred to as enhanced YARA rules in this paper, where if existing YARA rules fails to detect the inspected file as malware, then it is subjected to fuzzy hashing to assess whether this technique would identify it as malware. The second proposed technique called embedded YARA rules utilises fuzzy hashing and fuzzy rules to improve the outcomes further. Fuzzy rules countenance circumstances where data are imprecise or uncertain, generating a probabilistic outcome indicating the likelihood of whether a file is malware or not. The paper discusses the success of the proposed enhanced YARA rules and embedded YARA rules through several experiments on the collected malware and goodware corpus and their comparative evaluation against YARA rules.

References Powered by Scopus

Fuzzy Identification of Systems and Its Applications to Modeling and Control

17740Citations
N/AReaders
Get full text

An experiment in linguistic synthesis with a fuzzy logic controller

2409Citations
N/AReaders
Get full text

What are fuzzy rules and how to use them

372Citations
N/AReaders
Get full text

Cited by Powered by Scopus

The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

24Citations
N/AReaders
Get full text

Comparing Attack Models for IT Systems: Lockheed Martin's Cyber Kill Chain, MITRE ATT&CK Framework and Diamond Model

21Citations
N/AReaders
Get full text

YAMME: A YAra-byte-signatures Metamorphic Mutation Engine

17Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Naik, N., Jenkins, P., Savage, N., Yang, L., Boongoen, T., Iam-On, N., … Song, J. (2021). Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis. Complex and Intelligent Systems, 7(2), 687–702. https://doi.org/10.1007/s40747-020-00233-5

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

58%

Lecturer / Post doc 2

17%

Researcher 2

17%

Professor / Associate Prof. 1

8%

Readers' Discipline

Tooltip

Computer Science 15

79%

Engineering 2

11%

Social Sciences 1

5%

Mathematics 1

5%

Article Metrics

Tooltip
Social Media
Shares, Likes & Comments: 5

Save time finding and organizing research with Mendeley

Sign up for free