Skip to main content

A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction

  • Conference paper
  • First Online:
Advances on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2017)

Abstract

With the development of software security technology, more and more malicious programs constantly uses new confusion and feature hiding techniques, the malware detection technology need to upgrade urgently. This paper presents a malware detection method based on sandbox, binary instrumentation and multidimensional feature extraction. We introduced the design and implementation of sandbox, feature extractor and the classifier. Finally, we merged multiple models and get a pretty well classifier for the malware detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 2014 (2014)

    Google Scholar 

  2. Baldangombo, U., Jambaljav, N., Horng, S.J.: A static malware detection system using data mining methods. arXiv preprint arXiv:1308.2831 (2013)

  3. Divandari, H., Pechaz, B., Jahan, M.V.: Malware detection using Markov Blanket based on opcode sequences. In: International Congress on Technology, Communication and Knowledge (ICTCK) 2015, pp. 564–569. IEEE (2015)

    Google Scholar 

  4. Lee, J., Im, C., Jeong, H.: A study of malware detection and classification by comparing extracted strings. In: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, p. 75. ACM (2011)

    Google Scholar 

  5. Xiao, H., Stibor, T.: A supervised topic transition model for detecting malicious system call sequences. In: Proceedings of the 2011 Workshop on Knowledge Discovery, Modeling and Simulation, pp. 23–30. ACM (2011)

    Google Scholar 

  6. Gui, X., Liu, J., Chi, M., et al.: Analysis of malware application based on massive network traffic. China Commun. 13(8), 209–221 (2016)

    Article  Google Scholar 

  7. Alazab, M., Venkatraman, S., Watters, P., et al.: Zero-day malware detection based on supervised learning algorithms of API call signatures. In: Proceedings of the Ninth Australasian Data Mining Conference, vol. 121, pp. 171–182. Australian Computer Society, Inc. (2011)

    Google Scholar 

  8. https://software.intel.com/en-us/articles/pintool-downloads

  9. Cui, B., Wang, F., Guo, T., et al.: Flowwalker: a fast and precise off-line taint analysis framework. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), 2013, pp. 583–588. IEEE (2013)

    Google Scholar 

  10. http://j00ru.vexillium.org/ntapi/

  11. Jingling, Z., Shilei, C., Mengchen, C.A.O., et al.: Malware algorithm recognition based on offline instruction-flow analyse. J. Tsinghua Univ. (Sci. Technol.) 65(5), 484–492 (2016)

    Google Scholar 

  12. Cepeda, C., Tien, D.L.C., Ordóñez, P.: Feature selection and improving classification performance for malware detection. In: IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), 2016, pp. 560–566. IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chong Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, C., Ding, J., Guo, T., Cui, B. (2018). A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction. In: Barolli, L., Xhafa, F., Conesa, J. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-319-69811-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69811-3_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69810-6

  • Online ISBN: 978-3-319-69811-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics