A scalable multi-level feature extraction technique to detect malicious executables

  • Authors:
  • Mohammad M. Masud;Latifur Khan;Bhavani Thuraisingham

  • Affiliations:
  • Department of Computer Science, The University of Texas at Dallas, Richardson, USA 75080;Department of Computer Science, The University of Texas at Dallas, Richardson, USA 75083-0688;Department of Computer Science, The University of Texas at Dallas, Richardson, USA 75083-0688

  • Venue:
  • Information Systems Frontiers
  • Year:
  • 2008

Quantified Score

Hi-index 0.02

Visualization

Abstract

We present a scalable and multi-level feature extraction technique to detect malicious executables. We propose a novel combination of three different kinds of features at different levels of abstraction. These are binary n-grams, assembly instruction sequences, and Dynamic Link Library (DLL) function calls; extracted from binary executables, disassembled executables, and executable headers, respectively. We also propose an efficient and scalable feature extraction technique, and apply this technique on a large corpus of real benign and malicious executables. The above mentioned features are extracted from the corpus data and a classifier is trained, which achieves high accuracy and low false positive rate in detecting malicious executables. Our approach is knowledge-based because of several reasons. First, we apply the knowledge obtained from the binary n-gram features to extract assembly instruction sequences using our Assembly Feature Retrieval algorithm. Second, we apply the statistical knowledge obtained during feature extraction to select the best features, and to build a classification model. Our model is compared against other feature-based approaches for malicious code detection, and found to be more efficient in terms of detection accuracy and false alarm rate.