Visible to the public A Malware Similarity Analysis Method Based on Network Control Structure Graph

TitleA Malware Similarity Analysis Method Based on Network Control Structure Graph
Publication TypeConference Paper
Year of Publication2020
AuthorsWang, Duanyi, Shu, Hui, Kang, Fei, Bu, Wenjuan
Conference Name2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS)
Keywordscontrol branch point, feature extraction, graph theory, Human Behavior, Malware, malware analysis, Metrics, network control structure graph, privacy, pubcrawl, resilience, Resiliency, Resists, similarity analysis, Software algorithms, software engineering, Strain, Training
AbstractRecently, graph-based malware similarity analysis has been widely used in the field of malware detection. However, the wide application of code obfuscation, polymorphism, and deformation changes the structure of malicious code, which brings great challenges to the malware similarity analysis. To solve these problems, in this paper, we present a new approach to malware similarity analysis based on the network control structure graph (NCSG). This method analyzed the behavior of malware by application program interface (API) association and constructed NCSG. The graph could reflect the command-and-control(C&C) logic of malware. Therefore, it can resist the interference of code obfuscation technology. The structural features extracted from NCSG will be used as the basis of similarity analysis for training the detection model. Finally, we tested the dataset constructed from five known malware family samples, and the experimental results showed that the accuracy of this method for malware variation analysis reached 92.75%. In conclusion, the malware similarity analysis based on NCSG has a strong application value for identifying the same family of malware.
DOI10.1109/ICSESS49938.2020.9237633
Citation Keywang_malware_2020