Suppr超能文献

基于机器学习的无文件恶意软件检测的深入分析。

An Insight into the Machine-Learning-Based Fileless Malware Detection.

机构信息

FAST School of Computing, National University of Computer and Emerging Sciences (NUCES-FAST), Islamabad 44000, Pakistan.

Center for Cybersecurity, Brunno Kessler Foundation, 38123 Trento, Italy.

出版信息

Sensors (Basel). 2023 Jan 5;23(2):612. doi: 10.3390/s23020612.

Abstract

In recent years, massive development in the malware industry changed the entire landscape for malware development. Therefore, cybercriminals became more sophisticated by advancing their development techniques from file-based to fileless malware. As file-based malware depends on files to spread itself, on the other hand, fileless malware does not require a traditional file system and uses benign processes to carry out its malicious intent. Therefore, it evades conventional detection techniques and remains stealthy. This paper briefly explains fileless malware, its life cycle, and its infection chain. Moreover, it proposes a detection technique based on feature analysis using machine learning for fileless malware detection. The virtual machine acquired the memory dumps upon executing the malicious and non-malicious samples. Then the necessary features are extracted using the Volatility memory forensics tool, which is then analyzed using machine learning classification algorithms. After that, the best algorithm is selected based on the k-fold cross-validation score. Experimental evaluation has shown that Random Forest outperforms other machine learning classifiers (Decision Tree, Support Vector Machine, Logistic Regression, K-Nearest Neighbor, XGBoost, and Gradient Boosting). It achieved an overall accuracy of 93.33% with a True Positive Rate (TPR) of 87.5% at zeroFalse Positive Rate (FPR) for fileless malware collected from five widely used datasets (VirusShare, AnyRun, PolySwarm, HatchingTriage, and JoESadbox).

摘要

近年来,恶意软件产业的大规模发展改变了恶意软件开发的整体格局。因此,网络犯罪分子通过将其开发技术从基于文件的技术提升为无文件恶意软件,变得更加复杂。由于基于文件的恶意软件依赖文件来传播自身,另一方面,无文件恶意软件不需要传统的文件系统,并使用良性进程来执行其恶意意图。因此,它规避了传统的检测技术并保持了隐蔽性。本文简要介绍了无文件恶意软件、其生命周期及其感染链。此外,它还提出了一种基于机器学习的特征分析检测技术,用于检测无文件恶意软件。虚拟机在执行恶意和非恶意样本时获取内存转储。然后使用 Volatility 内存取证工具提取必要的特征,然后使用机器学习分类算法对其进行分析。之后,根据 k 折交叉验证分数选择最佳算法。实验评估表明,随机森林在其他机器学习分类器(决策树、支持向量机、逻辑回归、K-最近邻、XGBoost 和梯度提升)中表现更好。它在五个广泛使用的数据集(VirusShare、AnyRun、PolySwarm、HatchingTriage 和 JoESadbox)中收集的无文件恶意软件的总体准确率达到 93.33%,零误报率(FPR)下的真阳性率(TPR)为 87.5%。

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验