Probabilistic suffix models for API sequence analysis of Windows XP applications

Pattern Recognition(2008)

引用 29|浏览0
暂无评分
摘要
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigate using probabilistic suffix trees (PSTs) and associated suffix automata (PSAs) to build models of benign application behavior with the goal of subsequently being able to detect malicious applications as anything that deviates therefrom. We describe these probabilistic suffix models and present new generic analysis and manipulation algorithms. The models and the algorithms are then used in the context of API (i.e., system call) sequences realized by Windows XP applications. The analysis algorithms, when applied to traces (i.e., sequences of API calls) of benign and malicious applications, aid in choosing an appropriate modeling strategy in terms of distance metrics and consequently provide classification measures in terms of sequence-to-model matching. We give experimental results based on classification of unobserved traces of benign and malicious applications against a suffix model trained solely from traces generated by a small set of benign applications.
更多
查看译文
关键词
malicious mobile code,anomaly detection,probabilistic suffix model,api sequence classification,virus,worm,malicious application,suffix model,windows xp,benign application behavior,windows xp application,suffix automaton,api sequence analysis,analysis algorithm,benign application,agglomerative clustering,probabilistic suffix tree,classification measure,sequence analysis,distance metric
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要