A graph theoretic approach to fast and accurate malware detection
Title | A graph theoretic approach to fast and accurate malware detection |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Shafiq, Z., Liu, A. |
Conference Name | 2017 IFIP Networking Conference (IFIP Networking) and Workshops |
Date Published | jun |
Keywords | benign software, Complexity theory, Databases, detection time, false positive rate, feature extraction, graph theoretic approach, graph theory, GZero, Human Behavior, invasive software, Malware, malware analysis, Markov processes, Metrics, nonsignature malware detection schemes, obfuscation attacks, privacy, pubcrawl, resilience, Resiliency, Robustness, storage management, storage space, unknown malware |
Abstract | Due to the unavailability of signatures for previously unknown malware, non-signature malware detection schemes typically rely on analyzing program behavior. Prior behavior based non-signature malware detection schemes are either easily evadable by obfuscation or are very inefficient in terms of storage space and detection time. In this paper, we propose GZero, a graph theoretic approach fast and accurate non-signature malware detection at end hosts. GZero it is effective while being efficient in terms of both storage space and detection time. We conducted experiments on a large set of both benign software and malware. Our results show that GZero achieves more than 99% detection rate and a false positive rate of less than 1%, with less than 1 second of average scan time per program and is relatively robust to obfuscation attacks. Due to its low overheads, GZero can complement existing malware detection solutions at end hosts. |
URL | https://ieeexplore.ieee.org/document/8264865/ |
DOI | 10.23919/IFIPNetworking.2017.8264865 |
Citation Key | shafiq_graph_2017 |
- Malware Analysis
- unknown malware
- storage space
- storage management
- Robustness
- Resiliency
- resilience
- pubcrawl
- privacy
- obfuscation attacks
- nonsignature malware detection schemes
- Metrics
- Markov processes
- benign software
- malware
- invasive software
- Human behavior
- GZero
- graph theory
- graph theoretic approach
- feature extraction
- false positive rate
- detection time
- Databases
- Complexity theory