Unknown Malcode Detection Using OPCODE Representation

  • Authors:
  • Robert Moskovitch;Clint Feher;Nir Tzachar;Eugene Berger;Marina Gitelman;Shlomi Dolev;Yuval Elovici

  • Affiliations:
  • Deutsche Telekom Laboratories at Ben Gurion University, Ben Gurion University, Be'er Sheva, Israel 84105;Deutsche Telekom Laboratories at Ben Gurion University, Ben Gurion University, Be'er Sheva, Israel 84105;Deutsche Telekom Laboratories at Ben Gurion University, Ben Gurion University, Be'er Sheva, Israel 84105;Deutsche Telekom Laboratories at Ben Gurion University, Ben Gurion University, Be'er Sheva, Israel 84105;Deutsche Telekom Laboratories at Ben Gurion University, Ben Gurion University, Be'er Sheva, Israel 84105;Deutsche Telekom Laboratories at Ben Gurion University, Ben Gurion University, Be'er Sheva, Israel 84105;Deutsche Telekom Laboratories at Ben Gurion University, Ben Gurion University, Be'er Sheva, Israel 84105

  • Venue:
  • EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The recent growth in network usage has motivated the creation of new malicious code for various purposes, including economic ones. Today's signature-based anti-viruses are very accurate, but cannot detect new malicious code. Recently, classification algorithms were employed successfully for the detection of unknown malicious code. However, most of the studies use byte sequence n-grams representation of the binary code of the executables. We propose the use of (Operation Code) OpCodes, generated by disassembling the executables. We then use n-grams of the OpCodes as features for the classification process. We present a full methodology for the detection of unknown malicious code, based on text categorization concepts. We performed an extensive evaluation of a test collection of more than 30,000 files, in which we evaluated extensively the OpCode n-gram representation and investigated the imbalance problem, referring to real-life scenarios, in which the malicious file content is expected to be about 10% of the total files. Our results indicate that greater than 99% accuracy can be achieved through the use of a training set that has a malicious file percentage lower than 15%, which is higher than in our previous experience with byte sequence n-gram representation [1].