IDEAS home Printed from https://ideas.repec.org/a/hin/jnlmpe/769624.html
   My bibliography  Save this article

Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph

Author

Listed:
  • Jae-wook Jang
  • Jiyoung Woo
  • Aziz Mohaisen
  • Jaesung Yun
  • Huy Kang Kim

Abstract

As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich this effort and by capitalizing on ideas from the social network analysis domain, we build a tool that can help classify malware families using features driven from the graph structure of their system calls. To achieve that, we first construct a system call graph that consists of system calls found in the execution of the individual malware families. To explore distinguishing features of various malware species, we study social network properties as applied to the call graph, including the degree distribution, degree centrality, average distance, clustering coefficient, network density, and component ratio. We utilize features driven from those properties to build a classifier for malware families. Our experimental results show that “influence-based” graph metrics such as the degree centrality are effective for classifying malware, whereas the general structural metrics of malware are less effective for classifying malware. Our experiments demonstrate that the proposed system performs well in detecting and classifying malware families within each malware class with accuracy greater than 96%.

Suggested Citation

  • Jae-wook Jang & Jiyoung Woo & Aziz Mohaisen & Jaesung Yun & Huy Kang Kim, 2015. "Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph," Mathematical Problems in Engineering, Hindawi, vol. 2015, pages 1-20, October.
  • Handle: RePEc:hin:jnlmpe:769624
    DOI: 10.1155/2015/769624
    as

    Download full text from publisher

    File URL: http://downloads.hindawi.com/journals/MPE/2015/769624.pdf
    Download Restriction: no

    File URL: http://downloads.hindawi.com/journals/MPE/2015/769624.xml
    Download Restriction: no

    File URL: https://libkey.io/10.1155/2015/769624?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:jnlmpe:769624. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.