Applying static analysis to high-dimensional malicious application detection

  • Authors:
  • Sean Semple;Stanislav Ponomarev;Jan Durand;Travis Atkison

  • Affiliations:
  • Louisiana Tech University, Ruston, LA;Louisiana Tech University, Ruston, LA;Louisiana Tech University, Ruston, LA;Louisiana Tech University, Ruston, LA

  • Venue:
  • Proceedings of the 51st ACM Southeast Conference
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Signature based anti-virus systems inherently restrict the detection of new and previously unknown types of malicious attacks. To that end researchers are searching for methodologies to combat this problem. One potential method is the use of static application analysis. Using this methodology the applications are not executed to determine whether or not they contain malicious functionality. This paper presents a static application analysis methodology using the information retrieval technique of n-gram analysis and the dimensionality reduction techniques of randomized projection and mutual information to create a malicious application detection model. For this effort, a data set was extracted from Microsoft Windows applications that were either benign or possessed malicious functionality. Dimensionality and prediction methodology was then applied. Initial results show promise when comparing the prediction to expected outcomes. In one performance evaluation, the Boosted J48 algorithm achieved an accuracy of 99.08%.