PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables
نویسندگان
چکیده
The number of executable malware and the sophistication of their destructive ability has exponentially increased in past couple of years. Malware writers use sophisticated code obfuscation and encryption (a.k.a. packing) techniques to circumvent signatures – derived from the code of the malware for detection – stored in the signatures’ database of commercial off-the-shelf anti-virus software. In fact, it is claimed that more than half of new malware are created by simply re-packing the existing malware. Malware packing can undoubtedly be considered as the most challenging problem faced by anti-virus vendors nowadays. In this paper we present a novel scheme – PE-Probe – which has the ability to detect packed files and uses structural information of portable executables to detect zero-day (i.e. previously unseen) malicious executables. As a result, our proposed scheme is fully robust to code obfuscation and packing techniques. PE-Probe functions in two phases: (1) it classifies a given executable as packed or non-packed by employing well-studied heuristics, and (2) it invokes specialized structural models – separately developed for packed and non-packed executables – for malware detection on the basis of the outcome of the previous step. PE-Probe is real-time deployable as its scanning time is, on the average, less than quarter of a second per executable. We have carefully designed experiments – keeping in view the stringent testing scenarios – to analyze the reliability and robustness of our scheme to packing and obfuscation techniques. We report our experiments on a recently obtained malware dataset from OffensiveComputing.net, which contains more than half a million malicious executables.
منابع مشابه
PE-Miner: Realtime Mining of ‘Structural Information’ to Detect Zero-Day Malicious Portable Executables∗
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day malware without any a priori knowledge about them. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We f...
متن کاملPE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. previously unknown) malware. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We follow a threefol...
متن کاملArtificial Immune System based General Purpose Intrusion Detection System
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day malware without any a priori knowledge about them. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We f...
متن کاملUsing Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code
An intelligent detect system to recognition unknown computer virus is proposed. Using the method based on fuzzy pattern recognition algorithm, a malicious executable code detection network model is designed also. This model target at Win32 binary viruses on Intel IA32 architectures. It could detect known and unknown malicious code by analyzing their behavior. We gathered 423 benign and 209 mali...
متن کاملStructural Feature Based Anomaly Detection for Packed Executable Identification
Malware is any software with malicious intentions. Commercial anti-malware software relies on signature databases. This approach has proven to be effective when the threats are already known. However, malware writers employ software encryption tools and code obfuscation techniques to hide the actual behaviour of their malicious programs. One of these techniques is executable packing, which cons...
متن کامل