Cargando…

TagSeq: Malicious behavior discovery using dynamic analysis

In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still relies heavily on manual analysis for high-level s...

Descripción completa

Detalles Bibliográficos
Autores principales: Huang, Yi-Ting, Sun, Yeali S., Chen, Meng Chang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9109923/
https://www.ncbi.nlm.nih.gov/pubmed/35576222
http://dx.doi.org/10.1371/journal.pone.0263644
_version_ 1784708985904955392
author Huang, Yi-Ting
Sun, Yeali S.
Chen, Meng Chang
author_facet Huang, Yi-Ting
Sun, Yeali S.
Chen, Meng Chang
author_sort Huang, Yi-Ting
collection PubMed
description In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still relies heavily on manual analysis for high-level semantic descriptions. We develop a sequence-to-sequence (seq2seq) neural network, called TagSeq, to investigate a sequence of Windows API calls recorded from malware execution, and produce tags to label their malicious behavior. We propose embedding modules to transform Windows API function parameters, registry, filenames, and URLs into low-dimension vectors, while still preserving the closeness property. Moreover, we utilize an attention mechanism to capture the relations between generated tags and certain API invocation calls. Results show that the most possible malicious actions are identified by TagSeq. Examples and a case study demonstrate that the proposed embedding modules preserve semantic-physical relations and that the predicted tags reflect malicious intentions. We believe this work is suitable as a tool to help security analysts recognize malicious behavior and intent with easy-to-understand tags.
format Online
Article
Text
id pubmed-9109923
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-91099232022-05-17 TagSeq: Malicious behavior discovery using dynamic analysis Huang, Yi-Ting Sun, Yeali S. Chen, Meng Chang PLoS One Research Article In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still relies heavily on manual analysis for high-level semantic descriptions. We develop a sequence-to-sequence (seq2seq) neural network, called TagSeq, to investigate a sequence of Windows API calls recorded from malware execution, and produce tags to label their malicious behavior. We propose embedding modules to transform Windows API function parameters, registry, filenames, and URLs into low-dimension vectors, while still preserving the closeness property. Moreover, we utilize an attention mechanism to capture the relations between generated tags and certain API invocation calls. Results show that the most possible malicious actions are identified by TagSeq. Examples and a case study demonstrate that the proposed embedding modules preserve semantic-physical relations and that the predicted tags reflect malicious intentions. We believe this work is suitable as a tool to help security analysts recognize malicious behavior and intent with easy-to-understand tags. Public Library of Science 2022-05-16 /pmc/articles/PMC9109923/ /pubmed/35576222 http://dx.doi.org/10.1371/journal.pone.0263644 Text en © 2022 Huang et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Huang, Yi-Ting
Sun, Yeali S.
Chen, Meng Chang
TagSeq: Malicious behavior discovery using dynamic analysis
title TagSeq: Malicious behavior discovery using dynamic analysis
title_full TagSeq: Malicious behavior discovery using dynamic analysis
title_fullStr TagSeq: Malicious behavior discovery using dynamic analysis
title_full_unstemmed TagSeq: Malicious behavior discovery using dynamic analysis
title_short TagSeq: Malicious behavior discovery using dynamic analysis
title_sort tagseq: malicious behavior discovery using dynamic analysis
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9109923/
https://www.ncbi.nlm.nih.gov/pubmed/35576222
http://dx.doi.org/10.1371/journal.pone.0263644
work_keys_str_mv AT huangyiting tagseqmaliciousbehaviordiscoveryusingdynamicanalysis
AT sunyealis tagseqmaliciousbehaviordiscoveryusingdynamicanalysis
AT chenmengchang tagseqmaliciousbehaviordiscoveryusingdynamicanalysis