PE-Miner: Realtime Mining of ‘Structural Information’ to Detect Zero-Day Malicious Portable Executables∗

نویسندگان

  • M. Zubair Shafiq
  • S. Momina Tabish
  • Fauzan Mirza
  • Muddassar Farooq
چکیده

In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day malware without any a priori knowledge about them. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We follow a threefold research methodology: (1) identify a set of structural features for PE files, which is computable in realtime, (2) use an efficient preprocessor for removing redundancy in the features’ set, and (3) select an efficient data mining algorithm for final classification. The primary objective of PE-Miner is to distinguish between the benign and malicious executables; while its secondary task is to categorize the malicious executables as a function of their payload. We evaluated PE-Miner on two malware collections, VX Heavens and Malfease datasets that contain 11 and 5 thousand malicious PE files respectively. The results of our experiments show that PE-Miner achieves more than 99% detection rate with less than 0.5% false alarm rate for distinguishing between the benign and malicious executables. Furthermore, it achieves an average detection rate of 90% with an average false alarm rate of less than 5% for categorizing the malicious executables as a function of their payload. It is important to emphasize that PE-Miner has low processing overheads and takes only 0.244 seconds on the average to scan a given PE file. Finally, we evaluate the robustness and reliability of PE-Miner under several regression tests. Our results show that extracted features are “robust” to different packing techniques and PE-Miner is also resilient to majority of “crafty” evasion strategies. ∗The research presented in this paper is conducted at nexGIN RC and is funded by National ICT R&D Fund, Ministry of Information Technology, Government of Pakistan under the grant # ICTRDF/AN/2007/37. The information, data, comments, and views detailed herein may not necessarily reflect the endorsements of views of the National ICT R&D Fund.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime

In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. previously unknown) malware. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We follow a threefol...

متن کامل

Artificial Immune System based General Purpose Intrusion Detection System

In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day malware without any a priori knowledge about them. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We f...

متن کامل

PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables

The number of executable malware and the sophistication of their destructive ability has exponentially increased in past couple of years. Malware writers use sophisticated code obfuscation and encryption (a.k.a. packing) techniques to circumvent signatures – derived from the code of the malware for detection – stored in the signatures’ database of commercial off-the-shelf anti-virus software. I...

متن کامل

ELF-Miner: Using Structural Knowledge and Data Mining for Detecting Linux Malicious Executables

Linux malware can pose a significant threat – its (Linux) penetration is exponentially increasing – because little is known or understood about its vulnerabilities. We believe that now is the right time to devise non-signature based zero-day (previously unknown) malware detection strategies before Linux intruders take us by surprise. Therefore, in this paper, we first do a forensic analysis of ...

متن کامل

Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code

An intelligent detect system to recognition unknown computer virus is proposed. Using the method based on fuzzy pattern recognition algorithm, a malicious executable code detection network model is designed also. This model target at Win32 binary viruses on Intel IA32 architectures. It could detect known and unknown malicious code by analyzing their behavior. We gathered 423 benign and 209 mali...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009