Zhang Heyu, Li Binglong, Yu Shilong, Chang Chaowen, Li Jinhui, Yang Bohao
College of Cryptographic Engineering, Information Engineering University, Zhengzhou, Henan, China.
PeerJ Comput Sci. 2024 Aug 7;10:e2193. doi: 10.7717/peerj-cs.2193. eCollection 2024.
The combination of memory forensics and deep learning for malware detection has achieved certain progress, but most existing methods convert process dump to images for classification, which is still based on process byte feature classification. After the malware is loaded into memory, the original byte features will change. Compared with byte features, function call features can represent the behaviors of malware more robustly. Therefore, this article proposes the ProcGCN model, a deep learning model based on DGCNN (Deep Graph Convolutional Neural Network), to detect malicious processes in memory images. First, the process dump is extracted from the whole system memory image; then, the Function Call Graph (FCG) of the process is extracted, and feature vectors for the function node in the FCG are generated based on the word bag model; finally, the FCG is input to the ProcGCN model for classification and detection. Using a public dataset for experiments, the ProcGCN model achieved an accuracy of 98.44% and an 1 score of 0.9828. It shows a better result than the existing deep learning methods based on static features, and its detection speed is faster, which demonstrates the effectiveness of the method based on function call features and graph representation learning in memory forensics.
将内存取证与深度学习相结合用于恶意软件检测已取得一定进展,但大多数现有方法将进程转储转换为图像进行分类,这仍基于进程字节特征分类。恶意软件加载到内存后,原始字节特征会发生变化。与字节特征相比,函数调用特征能更稳健地表示恶意软件的行为。因此,本文提出了ProcGCN模型,这是一种基于深度图卷积神经网络(DGCNN)的深度学习模型,用于检测内存图像中的恶意进程。首先,从整个系统内存图像中提取进程转储;然后,提取该进程的函数调用图(FCG),并基于词袋模型为FCG中的函数节点生成特征向量;最后,将FCG输入到ProcGCN模型中进行分类检测。使用公开数据集进行实验,ProcGCN模型的准确率达到98.44%,F1分数为0.9828。它比现有的基于静态特征的深度学习方法表现更好,且检测速度更快,这证明了基于函数调用特征和图表示学习的方法在内存取证中的有效性。