Fig. 1. Architecture of OpenDPU
Fig. 2. Data processing steps of OpenDPU
Fig. 3. API Call Statement in Assembly Code
Fig. 4. Example of APICFG
Fig. 5. Space Complexity of 2-gram Features
Fig. 6. Scalability of OpenDPU
Table 1. Processing Time Per Features
Table 2. Performance Comparison
References
- I. You and Y. Kangbin. "Malware obfuscation techniques: A brief survey," 2010 International Conference on IEEE, Broadband, Wireless Computing, Communication and Applications(BWCCA), 2010.
- Symantec, "Internet Security Threat Report," vol.23, 2018.
- Michael Sikorski and Andrew Honig, "Practical Malware Analysis," San Francisco: No Strach Press, 2012.
- Charles LeDoux and Arun Lakhotia, "Malware and Machine Learning," Intelligent Methods for Cyber Warfare, Intelligent Methods for Cyber Warfare, Studies in Computational Intelligence Book Series, Springer, Vol.563, pp.1-42, 2014.
- Kaspersky Enterprise Cybersecurity, Machine Learning for Malware Detection [Internet], www.kaspersky.com/
- Rafiqul Islam, Ronghua Tian, Lynn M. Batten, and Steve Versteeg, "Classification of malware based on integrated static and dynamic features," Journal of Network and Computer Applications, Vol.36, Issue 2, pp.646-656, 2013. https://doi.org/10.1016/j.jnca.2012.10.004
- M. Ahmadi, D. Ulyanov, S. Semenov, M. Trofimov, and G. Giacinto, "Novel feature extraction, selection and fusion for effective malware family classification," in Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. ACM, pp.183-194, 2016.
- I. Santos and F. Brezo, "Opcode sequences as representation of executables for data-mining-based unknown malware detection," Information Sciences, Vol.231, pp.64-82, 2013. https://doi.org/10.1016/j.ins.2011.08.020
- SS. Hansen, TMT. Larsen, and M. Stevanovic, "An approach for detection and family classification of malware based on behavioral analysis," Computing, Networking and Communications(ICNC), 2016 International Conference on. IEEE, pp.1-5, 2016.
- M. Wagner, F. Fischer, R. Luh, A. Haberson, A. Rind, D. A. Keim, and W. Aigner, "A Survey of Visualization Systems for Malware Analysis," in EG Conference on visualization (EuroVis)-STARs, pp.105-125, 2015.
- Hadoop MapReduce [Internet], http://hadoop.apache.org/
- T. White, "Hadoop: The Definitive Guide: Storage and Analysis at the Internet Scale," 4th ed., Beijing: O'Reilly Media, 2015.
- C. Lin, N. Wang, H. Xiao, and C. Eckert, "Feature Selection and Extraction for Malware Classification," Journal of Informations Science and Engineering, Vol.31, No.3, pp.965-992, 2015.
- CWSandbox [Internet], https://cwsandbox.org/
- Cuckoo Sandbox [Internet], https://cuckoosandbox.org/
- R. Ronen, M. Radu, C. Feuerstein, E. Yom-Tov, and M. Ahmadi, "Microsoft Malware Classification Challenge," arXiv:1802.10135v1, 2018.
- T. Chen and C. Guestrin. "Xgboost: A scalable tree boosting system," in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, pp.785-794, 2016.
- VXHeaven [Internet], http://83.133.184.251/virensimulation.org/
- VirusShare [Internet], https://virusshare.com/
- Ninite, Ninite [Internet], https://ninite.com/
- Lupo PenSuite Collections, Lupo pensuite collections [Internet], http://www.lupopensuite.com/collection.htm, 2015.
- A. Liaw and M. Wiener, "Classification and regression by randomForest," R news, Vol.2, pp.18-22, 2002.
- V. Simon, S. O'Keefe, and J. Austin, "Hadoop neural network for parallel and distributed feature selection," Neural Networks 78, pp.24-35. 2015. https://doi.org/10.1016/j.neunet.2015.08.011
- M. Bala, O. Boussaid, and Z. Alimazighi, "P-ETL: Parallel-ETL based on the MapReduce paradigm," Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on. IEEE, 2014.
- Radare2 [Internet], https://rada.re/r/
- P. Singhal and N. Raul, "Malware detection module using machine learning algorithms to assist in centralized security in enterprise networks," International Jounal of Network Security & Its Applications(IJNSA), Vol.4, No.1, 2012.
- Malware.com [Internet], https://www.malwares.com/