Subroutine based detection of APT malware

Joseph Sexton, Curtis Storlie, Blake Anderson

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

Statistical detection of mass malware has been shown to be highly successful. However, this type of malware is less interesting to cyber security officers of larger organizations, who are more concerned with detecting malware indicative of a targeted attack. Here we investigate the potential of statistically based approaches to detect such malware using a malware family associated with a large number of targeted network intrusions. Our approach is complementary to the bulk of statistical based malware classifiers, which are typically based on measures of overall similarity between executable files. One problem with this approach is that a malicious executable that shares some, but limited, functionality with known malware is likely to be misclassified as benign. Here a new approach to malware classification is introduced that classifies programs based on their similarity with known malware subroutines. It is illustrated that malware and benign programs can share a substantial amount of code, implying that classification should be based on malicious subroutines that occur infrequently, or not at all in benign programs. Various approaches to accomplishing this task are investigated, and a particularly simple approach appears the most effective. This approach simply computes the fraction of subroutines of a program that are similar to malware subroutines whose likes have not been found in a larger benign set. If this fraction exceeds around 1.5 %, the corresponding program can be classified as malicious at a 1 in 1000 false alarm rate. It is further shown that combining a local and overall similarity based approach can lead to considerably better prediction due to the relatively low correlation of their predictions.

Original languageEnglish (US)
Pages (from-to)225-233
Number of pages9
JournalJournal of Computer Virology and Hacking Techniques
Volume12
Issue number4
DOIs
StatePublished - Nov 1 2016

Keywords

  • APT
  • Malware detection
  • Static analysis
  • Subroutine similarity

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Software
  • Hardware and Architecture
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Subroutine based detection of APT malware'. Together they form a unique fingerprint.

Cite this