Download presentation
Presentation is loading. Please wait.
Published byArline Bond Modified over 8 years ago
1
October 20-23rd, 2015 Automatically Combining Static Malware Detection Techniques ir. David De Lille 1
2
October 20-23rd, 2015 About me Ghent University, Belgium Sense of Security, Australia delilledavid@gmail.com 2
3
October 20-23rd, 2015 Agenda Introduction Background Methodology Results Conclusions 3
4
October 20-23rd, 2015 INTRODUCTION 4
5
October 20-23rd, 2015 Problem 5 Goodware Malware
6
October 20-23rd, 2015 Goal 6 GoodwareMalwareGoodware Malware Accuracy Cost Automatic
7
October 20-23rd, 2015 BACKGROUND 7
8
October 20-23rd, 2015 Collecting Data Cross validation 8 SampleClassTechn. 1Techn. 2Techn. 3 Sample1M110 Sample2G100 Sample3M111 Sample4G000 Avg. Cost71012
9
October 20-23rd, 2015 SampleClassTechn. 1Techn. 2Techn. 3 Sample1M110 Sample2G100 Sample3M111 Avg. Cost71012 SampleClassTechn. 1Techn. 2Techn. 3 Sample4G000 Avg. Cost71012 SampleClassTechn. 1Techn. 2Techn. 3 Sample1M110 Sample3M111 Avg. Cost71012 SampleClassTechn. 1Techn. 2Techn. 3 Sample2G100 Avg. Cost71012 SampleClassTechn. 1Techn. 2Techn. 3 Sample1M110 Sample2G100 Sample3M111 Sample4G000 Avg. Cost71012 Constructing DT 9 Techn. 1 Goodware Techn. 2 GoodwareMalware
10
October 20-23rd, 2015 Algorithms 10
11
October 20-23rd, 2015 Stop Conditions Same class Same values Minimum information gain Minimum # samples 11 SampleClassTechn. 1Techn. 2Techn. 3 SampleXG101 SampleYG101 SampleZM101
12
October 20-23rd, 2015 METHODOLOGY 12
13
October 20-23rd, 2015 Cross Validation Scheme 13
14
October 20-23rd, 2015 APK Android Application Package ZIP file Android Manifest Permissions 14
15
October 20-23rd, 2015 Samples 1598 malware samples: Android Malware Genome Project Contagio Mobile 1858 goodware samples: Top 60 Google Play Store 15
16
October 20-23rd, 2015 Restrictions Static techniques only No fingerprint techniques 16
17
October 20-23rd, 2015 Techniques 7 existing 1-NN on API calls (with a twist) 4 new DT based on permissions (2 versions) Does it have permissions? Does the APK contain an APK? 17
18
October 20-23rd, 2015 RESULTS 18
19
October 20-23rd, 2015 Results Techniques (1) TechniqueCostAccuracySensitivitySpecificity Adagio13.4s94.80%97.50%92.40% API-1NN6.7s95.40%96.40%94.50% BNB0.35s77.50%77.10%77.80% PNB0.35s77.20%79.90%77.50% HMNB0.35s79.30%78.40%80.10% Contains APK0.44s64.60%24.60%98.90% DroidLegacy137s75.70%71.80%79.10% Kirin0.35s68.80%47.60%87.50% Has Permissions0.35s47.20%99.30%2.40% Perm.-DT0.53s93.10%91.30%94.70% Perm.-DT-Enhanc.8.2s94.10% 94.20% 19
20
October 20-23rd, 2015 Results Techniques (2) 20
21
October 20-23rd, 2015 Results DTs 21
22
October 20-23rd, 2015 Other ensembles TechniqueAccuracy 1-NN96.66% 2-NN96.95% 3-NN97.24% 4-NN97.05% 5-NN97.28% Naive Bayes95.85% Neural Network97.36% Support Vector Machine95.59% Linear Discriminant Analysis96.66% 22
23
October 20-23rd, 2015 CONCLUSIONS 23
24
October 20-23rd, 2015 Conclusions EG2 best algorithm More efficient than other ensembles 24
25
October 20-23rd, 2015 Remarks The result is too static. The result is limited to known detection techniques. The authors only use static detection techniques. Would a malware expert get the best decision tree manually ? What is the advantage of DTs over the individual techniques? 25
26
October 20-23rd, 2015 Q&A 26 delilledavid@gmail.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.