Leveraging string kernels for malware detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

19 Scopus citations

Abstract

Signature-based malware detection will always be a step behind as novel malware cannot be detected. On the other hand, machine learning-based methods are capable of detecting novel malware but classification is frequently done in an offline or batched manner and is often associated with time overheads that make it impractical. We propose an approach that bridges this gap. This approach makes use of a support vector machine (SVM) to classify system call traces. In contrast to other methods that use system call traces for malware detection, our approach makes use of a string kernel to make better use of the sequential information inherent in a system call trace. By classifying system call traces in small sections and keeping a moving average over the probability estimates produced by the SVM, our approach is capable of detecting malicious behavior online and achieves great accuracy.

Original languageEnglish
Title of host publicationNetwork and System Security - 7th International Conference, NSS 2013, Proceedings
Pages206-219
Number of pages14
DOIs
StatePublished - 2013
Event7th International Conference on Network and System Security, NSS 2013 - Madrid, Spain
Duration: 3 Jun 20134 Jun 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7873 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th International Conference on Network and System Security, NSS 2013
Country/TerritorySpain
CityMadrid
Period3/06/134/06/13

Keywords

  • Machine Learning
  • Malware Detection
  • Security
  • System Calls

Fingerprint

Dive into the research topics of 'Leveraging string kernels for malware detection'. Together they form a unique fingerprint.

Cite this