Static Malware Analysis Using Machine Learning Methods

Citation:
Nath, HV, Mehtre BM.  2014.  Static Malware Analysis Using Machine Learning Methods, 2014. Recent Trends in Computer Networks and Distributed Systems Security. (Martínez Pérez, Gregorio, Thampi, Sabu M., Ko, Ryan, Shu, Lei, Eds.).:440-450., Berlin, Heidelberg: Springer Berlin Heidelberg

Date Presented:

2014

Abstract:

Malware analysis forms a critical component of cyber defense mechanism. In the last decade, lot of research has been done, using machine learning methods on both static as well as dynamic analysis. Since the aim and objective of malware developers have changed from just for fame to political espionage or financial gain, the malware is also getting evolved in its form, and infection methods. One of the latest form of malware is known as targeted malware, on which not much research has happened. Targeted malware, which is a superset of Advanced Persistent Threat (APT), is growing in its volume and complexity in recent years. Targeted Cyber attack (through targeted malware) plays an increasingly malicious role in disrupting the online social and financial systems. APTs are designed to steal corporate / national secrets and/or harm national/corporate interests. It is difficult to recognize targeted malware by antivirus, IDS, IPS and custom malware detection tools. Attackers leverage compelling social engineering techniques along with one or more zero day vulnerabilities for deploying APTs. Along with these, the recent introduction of Crypto locker and Ransom ware pose serious threats to organizations/nations as well as individuals. In this paper, we compare various machine-learning techniques used for analyzing malwares, focusing on static analysis.

Notes:

n/a