skip to main content
10.1145/2487788.2488056acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Unveiling Zeus: automated classification of malware samples

Published:13 May 2013Publication History

ABSTRACT

Malware family classification is an age old problem that many Anti-Virus (AV) companies have tackled. There are two common techniques used for classification, signature based and behavior based. Signature based classification uses a common sequence of bytes that appears in the binary code to identify and detect a family of malware. Behavior based classification uses artifacts created by malware during execution for identification. In this paper we report on a unique dataset we obtained from our operations and classified using several machine learning techniques using the behavior-based approach. Our main class of malware we are interested in classifying is the popular Zeus malware. For its classification we identify 65 features that are unique and robust for identifying malware families. We show that artifacts like file system, registry, and network features can be used to identify distinct malware families with high accuracy - in some cases as high as 95 percent.

References

  1. --. mlpy - Machine Learning Python. http://mlpy.sourceforge.net/, March 2013.Google ScholarGoogle Scholar
  2. E. Alpaydin. Introduction to machine learning. MIT press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In RAID, pages 178--197, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Binsalleeh, T. Ormerod, A. Boukhtouta, P. Sinha, A. Youssef, M. Debbabi, and L. Wang. On the analysis of the zeus botnet crimeware toolkit. In PST, pages 31--38, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  5. N. Falliere and E. Chien. Zeus: King of the Bots. Symantec Security Response (http://bit.ly/3VyFV1), November 2009.Google ScholarGoogle Scholar
  6. J. Kinable and O. Kostakis. Malware classification based on call graph clustering. Journal in computer virology, 7(4):233--245, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Kruss. Complete zeus source code has been leaked to the masses. http://bit.ly/lSsMrU, March 2011.Google ScholarGoogle Scholar
  8. T. Lee and J. J. Mody. Behavioral classification. In EICAR Conference, 2006.Google ScholarGoogle Scholar
  9. B. Nahorney and N. Falliere. Trojan.Zbot - Symantec report. http://bit.ly/9jQXfQ, February 2013.Google ScholarGoogle Scholar
  10. Y. Park, D. Reeves, V. Mulukutla, and B. Sundaravel. Fast malware classification by automated behavioral graph matching. In The Annual CSIIR Workshop, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. Provos, D. McNamee, P. Mavrommatis, K. Wang, N. Modadugu, et al. The ghost in the browser analysis of web-based malware. In HotBots, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Ramilli and M. Bishop. Multi-stage delivery of malware. In MALWARE, pages 91--97, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  13. K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov. Learning and classification of malware behavior. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 108--125, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Rieck, P. Trinius, C. Willems, and T. Holz. Automatic analysis of malware behavior using machine learning. Journal of Computer Security, 19(4):639--668, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. I. Santos, X. Ugarte-Pedrero, B. Sanz, C. Laorden, and P. G. Bringas. Collective classification for packed executable identification. In ACM CEAS, pages 23--30, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Tian, L. Batten, R. Islam, and S. Versteeg. An automated classification system based on the strings of trojan and virus families. In MALWARE, pages 23--30, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  17. R. Tian, L. Batten, and S. Versteeg. Function length as a tool for malware classification. In MALWARE, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  18. H. Zhao, M. Xu, N. Zheng, J. Yao, and Q. Ho. Malicious executables classification based on behavioral factor analysis. In IC4E, pages 502--506. IEEE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Unveiling Zeus: automated classification of malware samples

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        WWW '13 Companion: Proceedings of the 22nd International Conference on World Wide Web
        May 2013
        1636 pages
        ISBN:9781450320382
        DOI:10.1145/2487788

        Copyright © 2013 Copyright is held by the International World Wide Web Conference Committee (IW3C2).

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 May 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        WWW '13 Companion Paper Acceptance Rate831of1,250submissions,66%Overall Acceptance Rate1,899of8,196submissions,23%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader