Malware classification based on API calls and behaviour analysis


Pektas A., ACARMAN T.

IET INFORMATION SECURITY, cilt.12, ss.107-117, 2018 (SCI İndekslerine Giren Dergi) identifier identifier

  • Cilt numarası: 12 Konu: 2
  • Basım Tarihi: 2018
  • Doi Numarası: 10.1049/iet-ifs.2017.0430
  • Dergi Adı: IET INFORMATION SECURITY
  • Sayfa Sayıları: ss.107-117

Özet

This study presents the runtime behaviour-based classification procedure for Windows malware. Runtime behaviours are extracted with a particular focus on the determination of a malicious sequence of application programming interface (API) calls in addition to the file, network and registry activities. Mining and searching n-gram over API call sequences is introduced to discover episodes representing behaviour-based features of a malware. Voting Experts algorithm is used to extract malicious API patterns over API calls. The classification model is built by applying online machine learning algorithms and compared with the baseline classifiers. The model is trained and tested with a fairly large set of 17,400 malware samples belonging to 60 distinct families and 532 benign samples. The malware classification accuracy is reached at 98%.