Fast malware classification by automated behavioral graph matching

  • Authors:
  • Younghee Park;Douglas Reeves;Vikram Mulukutla;Balaji Sundaravel

  • Affiliations:
  • NC State University, Raleigh, NC;NC State University, Raleigh, NC;NC State University, Raleigh, NC;NC State University, Raleigh, NC

  • Venue:
  • Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malicious software (malware) is a serious problem in the Internet. Malware classification is useful for detection and analysis of new threats for which signatures are not available, or possible (due to polymorphism). This paper proposes a new malware classification method based on maximal common subgraph detection. A behavior graph is obtained by capturing system calls during the execution (in a sandboxed environment) of the suspicious software. The method has been implemented and tested on a set of 300 malware instances in 6 families. Results demonstrate the method effectively groups the malware instances, compared with previous methods of classification, is fast, and has a low false positive rate when presented with benign software.