Visible to the public Fuzzy-Import Hashing: A Malware Analysis Approach

TitleFuzzy-Import Hashing: A Malware Analysis Approach
Publication TypeConference Paper
Year of Publication2020
AuthorsNaik, N., Jenkins, P., Savage, N., Yang, L., Boongoen, T., Iam-On, N.
Conference Name2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
Keywordsattack surfaces, counterfeit malware samples, cryptography, Electronic mail, fuzzy c-means clustering, Fuzzy Cryptography, Fuzzy Hashing, fuzzy set theory, fuzzy-import hashing, Import Hashing, invasive software, malware analysis, Metrics, pubcrawl, ransomware, Resiliency, Scalability, Task Analysis
AbstractMalware has remained a consistent threat since its emergence, growing into a plethora of types and in large numbers. In recent years, numerous new malware variants have enabled the identification of new attack surfaces and vectors, and have become a major challenge to security experts, driving the enhancement and development of new malware analysis techniques to contain the contagion. One of the preliminary steps of malware analysis is to remove the abundance of counterfeit malware samples from the large collection of suspicious samples. This process assists in the management of man and machine resources effectively in the analysis of both unknown and likely malware samples. Hashing techniques are one of the fastest and efficient techniques for performing this preliminary analysis such as fuzzy hashing and import hashing. However, both hashing methods have their limitations and they may not be effective on their own, instead the combination of two distinctive methods may assist in improving the detection accuracy and overall performance of the analysis. This paper proposes a Fuzzy-Import hashing technique which is the combination of fuzzy hashing and import hashing to improve the detection accuracy and overall performance of malware analysis. This proposed Fuzzy-Import hashing offers several benefits which are demonstrated through the experimentation performed on the collected malware samples and compared against stand-alone techniques of fuzzy hashing and import hashing.
DOI10.1109/FUZZ48607.2020.9177636
Citation Keynaik_fuzzy-import_2020