The constant growth in the number of malware - software or code fragment potentially harmful for computers and information networks - and the use of sophisticated evasion and obfuscation techniques have seriously hindered classic signature-based approaches. On the other hand, malware detection systems based on machine learning techniques started offering a promising alternative to standard approaches, drastically reducing analysis time and turning out to be more robust against evasion and obfuscation techniques. In this paper, we propose a malware taxonomic classification pipeline able to classify Windows Portable Executable files (PEs). Given an input PE sample, it is first classified as either malicious or benign. If malicious, the pipeline further analyzes it in order to establish its threat type, family, and behavior(s). We tested the proposed pipeline on the open source dataset EMBER, containing approximately 1 million PE samples, analyzed through static analysis. Obtained malware detection results are comparable to other academic works in the current state of art and, in addition, we provide an in-depth classification of malicious samples. Models used in the pipeline provides interpretable results which can help security analysts in better understanding decisions taken by the automated pipeline.
翻译:另一方面,基于机器学习技术的恶意软件检测系统开始为标准方法提供有希望的替代方法,极大地缩短了分析时间,结果发现对规避和混淆技术的打击更加有力。在本文件中,我们提议了一种恶意软件分类管道,能够对视窗便携式可执行文件进行分类。根据输入的PE样本,它首先被归类为恶意或良性。如果恶意,管道进一步分析,以确定其威胁类型、家庭和行为。我们在开放源数据集EMBER上测试了拟议的管道,该管道包含大约100万个PE样本,通过静态分析加以分析。获得的恶意软件检测结果与目前状态下的其他学术工作相似,此外,我们提供了对恶意样品的深入分类。在管道中使用的模型提供了可解释的结果,有助于安全分析员更好地了解自动管道作出的决定。