Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been proposed to mitigate the malware threat. A running theme among existing detection techniques is the similar promises of high detection rates, in spite of the wildly different models (or specification classes) of malicious activity used. In addition, the lack of a common testing methodology and the limited datasets used in the experiments make difficult to compare these models in order to determine which ones yield the best detection accuracy. In this paper, we present a systematic approach to measure how the choice of behavioral models influences the quality of a malware detector. We tackle this problem by executing a large number of testing experiments, in which we explored the parameter space of over 200 different models, corresponding to more than 220 million of signatures. Our results suggest that commonly held beliefs about simple models are incorrect in how they relate changes in complexity to changes in detection accuracy. This implies that accuracy is non-linear across the model space, and that analytical reasoning is insufficient for finding an optimal model, and has to be supplemented by testing and empirical measurements.

A quantitative study of accuracy in system call-based malware detection / D. Canali, A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, E. Kirda - In: ISSTA 2012New York : Association for computer machinery, 2012 Apr. - ISBN 9781450314541. - pp. 122-132 (( convegno International Symposium on Software Testing and Analysis (ISSTA) tenutosi a Minneapolis nel 2012 [10.1145/2338965.2336768].

A quantitative study of accuracy in system call-based malware detection

A. Lanzi
Secondo
;
2012

Abstract

Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been proposed to mitigate the malware threat. A running theme among existing detection techniques is the similar promises of high detection rates, in spite of the wildly different models (or specification classes) of malicious activity used. In addition, the lack of a common testing methodology and the limited datasets used in the experiments make difficult to compare these models in order to determine which ones yield the best detection accuracy. In this paper, we present a systematic approach to measure how the choice of behavioral models influences the quality of a malware detector. We tackle this problem by executing a large number of testing experiments, in which we explored the parameter space of over 200 different models, corresponding to more than 220 million of signatures. Our results suggest that commonly held beliefs about simple models are incorrect in how they relate changes in complexity to changes in detection accuracy. This implies that accuracy is non-linear across the model space, and that analytical reasoning is insufficient for finding an optimal model, and has to be supplemented by testing and empirical measurements.
behavior; evaluation; malware; Security
Settore INF/01 - Informatica
apr-2012
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
issta2012.pdf

accesso riservato

Tipologia: Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione 571.13 kB
Formato Adobe PDF
571.13 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
p122-canali.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 576.13 kB
Formato Adobe PDF
576.13 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/233477
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 116
  • ???jsp.display-item.citation.isi??? ND
social impact