IMAD: in-execution malware analysis and detection

  • Authors:
  • Syed Bilal Mehdi;Ajay Kumar Tanwani;Muddassar Farooq

  • Affiliations:
  • Next Generation Intelligent Networks Research Center, National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan;Next Generation Intelligent Networks Research Center, National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan;Next Generation Intelligent Networks Research Center, National University of Computer & Emerging Sciences (FAST-NUCES), Islamabad, Pakistan

  • Venue:
  • Proceedings of the 11th Annual conference on Genetic and evolutionary computation
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore, advocate the need for developing sophisticated, efficient, and accurate malware classification techniques that can detect a malware on the first day of its launch -- commonly known as "zero-day malware detection". To this end, we present a new technique, IMAD, that can not only identify zero-day malware without any apriori knowledge but can also detect a malicious process while it is executing (in-execution detection). The capability of in-execution malware detection empowers an operating system to immediately kill it before it can cause any significant damage. IMAD is a realtime, dynamic, efficient, in-execution zero-day malware detection scheme, which analyzes the system call sequence of a process to classify it as malicious or benign. We use Genetic Algorithm to optimize system parameters of our scheme. The evolutionary algorithm is evaluated on real world synthetic data extracted from a Linux system. The results of our experiments show that IMAD achieves more than 90% accuracy in classifying in-execution processes as benign or malicious. Moreover, our scheme can classify approximately 50% of malicious processes within first 20% of their system calls.