2 research outputs found
Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations
In this work we propose a graph-based model that, utilizing relations between
groups of System-calls, distinguishes malicious from benign software samples
and classifies the detected malicious samples to one of a set of known malware
families. More precisely, given a System-call Dependency Graph (ScDG) that
depicts the malware's behavior, we first transform it to a more abstract
representation, utilizing the indexing of System-calls to a set of groups of
similar functionality, constructing thus an abstract and mutation-tolerant
graph that we call Group Relation Graph (GrG); then, we construct another graph
representation, which we call Coverage Graph (CvG), that depicts the dominating
relations between the nodes of a GrG graph. Based on the research so far in the
field, we pointed out that behavior-based graph representations had not
leveraged the aspect of the temporal evolution of the graph. Hence, the novelty
of our work is that, preserving the initial representations of GrG and CvG
graphs, we focus on augmenting the potentials of theses graphs by adding
further features that enhance its abilities on detecting and further
classifying to a known malware family an unknown malware sample. To that end,
we construct periodical instances of the graph that represent its temporal
evolution concerning its structural modifications, creating another graph
representation that we call Temporal Graphs. In this paper, we present the
theoretical background behind our approach, discuss the current technological
status on malware detection and classification and demonstrate the overall
architecture of our proposed detection and classification model alongside with
its underlying main principles and its structural key-components.Comment: 23 pages, 15 figures, 1 tabl
Advances in Security in Computing and Communications
In the era of Internet of Things (IoT) and with the explosive worldwide
growth of electronic data volume, and associated need of processing, analysis,
and storage of such humongous volume of data, several new challenges are faced
in protect-ing privacy of sensitive data and securing systems by designing
novel schemes for secure authentication, integrity protection, encryption, and
non-repudiation. Lightweight symmetric key cryptography and adaptive network
security algo-rithms are in demand for mitigating these challenges. This book
presents some of the state-of-the-art research work in the field of
cryptography and security in computing and communications. It is a valuable
source of knowledge for re-searchers, engineers, practitioners, graduates, and
doctoral students who are working in the field of cryptography, network
security, and security and privacy issues in the Internet of Things (IoT). It
will also be useful for faculty members of graduate schools and universities.Comment: 190 pages, 8 Chapters. Published by Intech Open Publishers, Croatia,
July 201