TY - GEN
T1 - A behavior based malware detection scheme for avoiding false positive
AU - Fukushima, Yoshiro
AU - Sakai, Akihiro
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2010
Y1 - 2010
N2 - The number of malware is increasing rapidly and a lot of malware use stealth techniques such as encryption to evade pattern matching detection by anti-virus software. To resolve the problem, behavior based detection method which focuses on malicious behaviors of malware have been researched. Although they can detect unknown and encrypted malware, they suffer a serious problem of false positives against benign programs. For example, creating files and executing them are common behaviors performed by malware, however, they are also likely performed by benign programs thus it causes false positives. In this paper, we propose a malware detection method based on evaluation of suspicious process behaviors on Windows OS. To avoid false positives, our proposal focuses on not only malware specific behaviors but also normal behavior that malware would usually not do. Moreover, we implement a prototype of our proposal to effectively analyze behaviors of programs. Our evaluation experiments using our malware and benign program datasets show that our malware detection rate is about 60% and it does not cause any false positives. Furthermore, we compare our proposal with completely behavior-based anti-virus software. Our results show that our proposal puts few burdens on users and reduces false positives.
AB - The number of malware is increasing rapidly and a lot of malware use stealth techniques such as encryption to evade pattern matching detection by anti-virus software. To resolve the problem, behavior based detection method which focuses on malicious behaviors of malware have been researched. Although they can detect unknown and encrypted malware, they suffer a serious problem of false positives against benign programs. For example, creating files and executing them are common behaviors performed by malware, however, they are also likely performed by benign programs thus it causes false positives. In this paper, we propose a malware detection method based on evaluation of suspicious process behaviors on Windows OS. To avoid false positives, our proposal focuses on not only malware specific behaviors but also normal behavior that malware would usually not do. Moreover, we implement a prototype of our proposal to effectively analyze behaviors of programs. Our evaluation experiments using our malware and benign program datasets show that our malware detection rate is about 60% and it does not cause any false positives. Furthermore, we compare our proposal with completely behavior-based anti-virus software. Our results show that our proposal puts few burdens on users and reduces false positives.
UR - http://www.scopus.com/inward/record.url?scp=79952044700&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952044700&partnerID=8YFLogxK
U2 - 10.1109/NPSEC.2010.5634444
DO - 10.1109/NPSEC.2010.5634444
M3 - Conference contribution
AN - SCOPUS:79952044700
SN - 9781424489152
T3 - 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010
SP - 79
EP - 84
BT - 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010
T2 - 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010
Y2 - 5 October 2010 through 5 October 2010
ER -