Skip to main content

Detecting Trojans Using Data Mining Techniques

  • Conference paper
Wireless Networks, Information Processing and Systems (IMTIC 2008)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 20))

Included in the following conference series:

Abstract

A trojan horse is a program that surreptitiously performs its operation under the guise of a legitimate program. Traditional approaches using signatures to detect these programs pose little danger to new and unseen samples whose signatures are not available. The focus of malware research is shifting from using signature patterns to identifying the malicious behavior displayed by these malwares. This paper presents the novel idea of extracting variable length instruction sequences that can identify trojans from clean programs using data mining techniques. The analysis is facilitated by the program control flow information contained in the instruction sequences. Based on general statistics gathered from these instruction sequences, we formulated the problem as a binary classification problem and built random forest, bagging and support vector machine classifiers. Our approach showed a 94.0% detection rate on novel trojans whose data was not used in the model building process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Download.com, http://www.download.com/

  2. The r project for statistical computing, http://www.r-project.org/

  3. Generic Unpacker Win32, http://www.exetools.com/unpackers.htm

  4. IDA Pro Disassembler, http://www.datarescue.com/idabase/index.htm

  5. PEiD, http://peid.has.it/

  6. UPX the Ultimate Packer for eXecutables, http://www.exeinfo.go.pl/

  7. VMUnpacker, http://dswlab.com/d3.html

  8. VX Heavens, http://vx.netlux.org

  9. Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - (COMPSAC 2004), vol. 2, pp. 41–42 (2004)

    Google Scholar 

  10. Arnold, W., Tesauro, G.: Automatically generated win32 heuristic virus detection. In: Virus Bulletin Conference, pp. 123–132 (2000)

    Google Scholar 

  11. Breiman, L.: Bagging predictors. Machine Learning 24(2), 123–140 (1996)

    Google Scholar 

  12. Breiman, L.: Random forests. Machine Learning 45(1), 5–32 (2001)

    Article  Google Scholar 

  13. Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (1985)

    Google Scholar 

  14. Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2004)

    Google Scholar 

  15. Rabek, J.C., Khazan, R.I., Lewandowski, S.M., Cunningham, R.K.: Detection of injected, dynamically generated, and obfuscated malicious code. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp. 76–82 (2003)

    Google Scholar 

  16. Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 38–49 (2001)

    Google Scholar 

  17. Siddiqui, M., Wang, M.C., Lee, J.: Data mining methods for malware detection using instruction sequences. In: Proceedings of Artificial Intelligence and Applications, AIA 2008. ACTA Press (2008)

    Google Scholar 

  18. Sung, A.H., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables. In: 20th Annual Computer Security Applications Conference, pp. 326–334 (2004)

    Google Scholar 

  19. Symantec. Understanding heuristics: Symantec’s bloodhound technology. Technical report, Symantec Corporation (1997)

    Google Scholar 

  20. Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey (2005)

    Google Scholar 

  21. Webb, A.: Statisitcal Pattern Recognition. Wiley, Chichester (2005)

    Google Scholar 

  22. Weber, M., Schmid, M., Schatz, M., Geyer, D.: A toolkit for detecting and analyzing malicious software. In: Proceedings of the 18th Annual Computer Security Applications Conference, p. 423 (2002)

    Google Scholar 

  23. Williams, M.: Anti-trojan and trojan detection with in-kernel digital signature testing of executables. Technical report, NetXSecure NZ Limited (2002)

    Google Scholar 

  24. Ye, Y., Wang, D., Li, T., Ye, D.: Imds: intelligent malware detection system. In: KDD 2007: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1043–1047. ACM Press, New York (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Siddiqui, M., Wang, M.C., Lee, J. (2008). Detecting Trojans Using Data Mining Techniques. In: Hussain, D.M.A., Rajput, A.Q.K., Chowdhry, B.S., Gee, Q. (eds) Wireless Networks, Information Processing and Systems. IMTIC 2008. Communications in Computer and Information Science, vol 20. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89853-5_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89853-5_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89852-8

  • Online ISBN: 978-3-540-89853-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics