Abstract
This paper presents the detection techniques of anomalous programs based on the analysis of their system call traces. We collect the API calls for the tested executable programs from Microsoft detour system and extract the features for our classification task using the previously established n-gram technique. We propose three different feature extraction approaches in this paper. These are frequency-based, time-based and a hybrid approach which actually combines the first two approaches. We use the well-known classifier algorithms in our experiments using WEKA interface to classify the malicious programs from the benign programs. Our empirical evidence demonstrates that the proposed feature extraction approaches can detect malicious programs over 88% which is quite promising for the contemporary similar research.
Original language | English |
---|---|
Title of host publication | Proceedings of the International Conference on Informatics Engineering and Information Science |
Subtitle of host publication | ICIEIS 2011 |
Editors | Azizah Abd Manaf, Shamsul Sahibuddin, Rabiah Ahmad, Salwani Modh Daud, Eyas El-Qawashmeh |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 383-394 |
Number of pages | 12 |
Volume | 254 |
ISBN (Electronic) | 9783642254826 |
DOIs | |
Publication status | Published - 2011 |
Event | International Conference on Informatics Engineering and Information Science: ICIEI 2011 - Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia Duration: 14 Nov 2011 → 16 Nov 2011 http://icieis2011.sdiwc.us/ (Event home page) |
Publication series
Name | Communications in Computer and Information Science |
---|
Conference
Conference | International Conference on Informatics Engineering and Information Science |
---|---|
Country/Territory | Malaysia |
City | Kuala Lumpur |
Period | 14/11/11 → 16/11/11 |
Internet address |
|