Cargando…
TagSeq: Malicious behavior discovery using dynamic analysis
In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still relies heavily on manual analysis for high-level s...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9109923/ https://www.ncbi.nlm.nih.gov/pubmed/35576222 http://dx.doi.org/10.1371/journal.pone.0263644 |
_version_ | 1784708985904955392 |
---|---|
author | Huang, Yi-Ting Sun, Yeali S. Chen, Meng Chang |
author_facet | Huang, Yi-Ting Sun, Yeali S. Chen, Meng Chang |
author_sort | Huang, Yi-Ting |
collection | PubMed |
description | In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still relies heavily on manual analysis for high-level semantic descriptions. We develop a sequence-to-sequence (seq2seq) neural network, called TagSeq, to investigate a sequence of Windows API calls recorded from malware execution, and produce tags to label their malicious behavior. We propose embedding modules to transform Windows API function parameters, registry, filenames, and URLs into low-dimension vectors, while still preserving the closeness property. Moreover, we utilize an attention mechanism to capture the relations between generated tags and certain API invocation calls. Results show that the most possible malicious actions are identified by TagSeq. Examples and a case study demonstrate that the proposed embedding modules preserve semantic-physical relations and that the predicted tags reflect malicious intentions. We believe this work is suitable as a tool to help security analysts recognize malicious behavior and intent with easy-to-understand tags. |
format | Online Article Text |
id | pubmed-9109923 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-91099232022-05-17 TagSeq: Malicious behavior discovery using dynamic analysis Huang, Yi-Ting Sun, Yeali S. Chen, Meng Chang PLoS One Research Article In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still relies heavily on manual analysis for high-level semantic descriptions. We develop a sequence-to-sequence (seq2seq) neural network, called TagSeq, to investigate a sequence of Windows API calls recorded from malware execution, and produce tags to label their malicious behavior. We propose embedding modules to transform Windows API function parameters, registry, filenames, and URLs into low-dimension vectors, while still preserving the closeness property. Moreover, we utilize an attention mechanism to capture the relations between generated tags and certain API invocation calls. Results show that the most possible malicious actions are identified by TagSeq. Examples and a case study demonstrate that the proposed embedding modules preserve semantic-physical relations and that the predicted tags reflect malicious intentions. We believe this work is suitable as a tool to help security analysts recognize malicious behavior and intent with easy-to-understand tags. Public Library of Science 2022-05-16 /pmc/articles/PMC9109923/ /pubmed/35576222 http://dx.doi.org/10.1371/journal.pone.0263644 Text en © 2022 Huang et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Huang, Yi-Ting Sun, Yeali S. Chen, Meng Chang TagSeq: Malicious behavior discovery using dynamic analysis |
title | TagSeq: Malicious behavior discovery using dynamic analysis |
title_full | TagSeq: Malicious behavior discovery using dynamic analysis |
title_fullStr | TagSeq: Malicious behavior discovery using dynamic analysis |
title_full_unstemmed | TagSeq: Malicious behavior discovery using dynamic analysis |
title_short | TagSeq: Malicious behavior discovery using dynamic analysis |
title_sort | tagseq: malicious behavior discovery using dynamic analysis |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9109923/ https://www.ncbi.nlm.nih.gov/pubmed/35576222 http://dx.doi.org/10.1371/journal.pone.0263644 |
work_keys_str_mv | AT huangyiting tagseqmaliciousbehaviordiscoveryusingdynamicanalysis AT sunyealis tagseqmaliciousbehaviordiscoveryusingdynamicanalysis AT chenmengchang tagseqmaliciousbehaviordiscoveryusingdynamicanalysis |