Skip to main content

A Pattern Recognition System for Malicious PDF Files Detection

  • Conference paper
Machine Learning and Data Mining in Pattern Recognition (MLDM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7376))

Abstract

Malicious PDF files have been used to harm computer security during the past two-three years, and modern antivirus are proving to be not completely effective against this kind of threat. In this paper an innovative technique, which combines a feature extractor module strongly related to the structure of PDF files and an effective classifier, is presented. This system has proven to be more effective than other state-of-the-art research tools for malicious PDF detection, as well as than most of antivirus in commerce. Moreover, its flexibility allows adopting it either as a stand-alone tool or as plug-in to improve the performance of an already installed antivirus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wepawet, http://wepawet.iseclab.org/

  2. IBM : IBM X-Force 2010 Mid-Year Trend and Risk Report (2010)

    Google Scholar 

  3. Symantec : Symantec Global Internet Security Threat Report. Trends for 2009 (2010)

    Google Scholar 

  4. Parker, T.: Navigating the Internal Structure of a PDF Document, http://www.planetpdf.com

  5. Decalage: PDF Security Isseues, http://www.decalage.info

  6. Ogorkiewicz, M., Frej, P.: Analysis of Buffer Overflow Attacks (2004), http://www.windowsecurity.com

  7. Ramachandran, V.: Buffer Overflow Primer Video Series, http://www.securitytube.net

  8. Ratanaworabhan, P., Livshits, B., Zorn, B.: NOZZLE: A Defense Against Heap-spraying Code Injection Attacks. In: SSYM 2009 Proceedings of the 18th Conference on USENIX Security Symposium (2009)

    Google Scholar 

  9. Bania, P.: JIT Spraying and Mitigations. CoRR (2010)

    Google Scholar 

  10. Stevens, D.: PDF tools, http://blog.didierstevens.com/programs/pdf-tools/

  11. Contagio, http://contagiodump.blogspot.com/

  12. Cova, M., http://www.cs.bham.ac.uk/~covam/blog/pdf/

  13. Dixon, B., http://blog.9bplus.com

  14. Willems, C., Holz, T., Freiling, F.: Toward Automated Dynamic Malware Analysis Using CWSandbox. Journal IEEE Security and Privacy Archive 5(2) (2007)

    Google Scholar 

  15. Cova, M., Kruegel, C., Vigna, G.: Detection and Analysis of Drive-by-Downloads Attacks and Malicious Javascript Code. In: Proceedings of International World Wide Web Conference, WWW 2010 (2010)

    Google Scholar 

  16. Tzermias, Z., Sykiotakis, G., Polychronakis, M., Markatos, E.P.: Combining Static and Dynamic Analysis for the Detection of Malicious Documents. In: EUROSEC 2011 Proceedings of the Fourth European Workshop on System Security (2011)

    Google Scholar 

  17. Laskov, P., Šrndić, N.: Static Detection of Malicious JavaScript-Bearing PDF Documents. In: Annual Computer Security Applications Conference (2011)

    Google Scholar 

  18. Yahoo, http://www.yahoo.com

  19. Virus Total, http://www.virustotal.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maiorca, D., Giacinto, G., Corona, I. (2012). A Pattern Recognition System for Malicious PDF Files Detection. In: Perner, P. (eds) Machine Learning and Data Mining in Pattern Recognition. MLDM 2012. Lecture Notes in Computer Science(), vol 7376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31537-4_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31537-4_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31536-7

  • Online ISBN: 978-3-642-31537-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics