Skip to main content

A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 12))

Abstract

With the development of software security technology, more and more malicious programs constantly uses new confusion and feature hiding techniques, the malware detection technology need to upgrade urgently. This paper presents a malware detection method based on sandbox, binary instrumentation and multidimensional feature extraction. We introduced the design and implementation of sandbox, feature extractor and the classifier. Finally, we merged multiple models and get a pretty well classifier for the malware detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 2014 (2014)

    Google Scholar 

  2. Baldangombo, U., Jambaljav, N., Horng, S.J.: A static malware detection system using data mining methods. arXiv preprint arXiv:1308.2831 (2013)

  3. Divandari, H., Pechaz, B., Jahan, M.V.: Malware detection using Markov Blanket based on opcode sequences. In: International Congress on Technology, Communication and Knowledge (ICTCK) 2015, pp. 564–569. IEEE (2015)

    Google Scholar 

  4. Lee, J., Im, C., Jeong, H.: A study of malware detection and classification by comparing extracted strings. In: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, p. 75. ACM (2011)

    Google Scholar 

  5. Xiao, H., Stibor, T.: A supervised topic transition model for detecting malicious system call sequences. In: Proceedings of the 2011 Workshop on Knowledge Discovery, Modeling and Simulation, pp. 23–30. ACM (2011)

    Google Scholar 

  6. Gui, X., Liu, J., Chi, M., et al.: Analysis of malware application based on massive network traffic. China Commun. 13(8), 209–221 (2016)

    Article  Google Scholar 

  7. Alazab, M., Venkatraman, S., Watters, P., et al.: Zero-day malware detection based on supervised learning algorithms of API call signatures. In: Proceedings of the Ninth Australasian Data Mining Conference, vol. 121, pp. 171–182. Australian Computer Society, Inc. (2011)

    Google Scholar 

  8. https://software.intel.com/en-us/articles/pintool-downloads

  9. Cui, B., Wang, F., Guo, T., et al.: Flowwalker: a fast and precise off-line taint analysis framework. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), 2013, pp. 583–588. IEEE (2013)

    Google Scholar 

  10. http://j00ru.vexillium.org/ntapi/

  11. Jingling, Z., Shilei, C., Mengchen, C.A.O., et al.: Malware algorithm recognition based on offline instruction-flow analyse. J. Tsinghua Univ. (Sci. Technol.) 65(5), 484–492 (2016)

    Google Scholar 

  12. Cepeda, C., Tien, D.L.C., Ordóñez, P.: Feature selection and improving classification performance for malware detection. In: IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), 2016, pp. 560–566. IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chong Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, C., Ding, J., Guo, T., Cui, B. (2018). A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction. In: Barolli, L., Xhafa, F., Conesa, J. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-319-69811-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69811-3_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69810-6

  • Online ISBN: 978-3-319-69811-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics