Scalable malware classification with multifaceted content features and threat intelligence

X. Hu, J. Jang, T. Wang, Z. Ashraf, M. Ph Stoecklin, D. Kirat

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

Recent years have witnessed the very rapid increase in both the volume and sophistication of malware programs. Malware authors invest heavily in technologies and capabilities to streamline the process of building and mutating existing malware programs to evade traditional protection. One major challenge currently faced by the antivirus industry is to efficiently process the vast amount of incoming suspicious samples. Since most new malware is a variation of an existing malware family with the same forms of malicious behavior, automatic clustering and classification of malware programs into families have become valuable tools for malware analysts. Such grouping criteria not only allow analysts to prioritize the allocation of their investigation efforts but may also be applied to detect new malware samples based on their association with existing families. In this paper, we address the multi-class malware classification challenge from a scalability perspective. We present the design, development, and evaluation of a novel machine learning classifier trained on multifaceted content features (e.g., instruction sequences, strings, section information, and other malware features) as well as threat intelligence gathered from external sources (e.g., antivirus output). Our experiments on a dataset of 21,741 malware samples demonstrate the efficacy and precision of the proposed algorithm and also provide insights into the utility of various features.

Original languageEnglish (US)
Article number7523365
JournalIBM Journal of Research and Development
Volume60
Issue number4
DOIs
StatePublished - Jul 1 2016

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Scalable malware classification with multifaceted content features and threat intelligence'. Together they form a unique fingerprint.

Cite this