Nowadays, malware and malware incidents are increasing daily, even with various antivirus systems and malware detection or classification methodologies. Machine learning techniques have been the main focus of the security experts to detect malware and determine their families. Many static, dynamic, and hybrid techniques have been presented for that purpose. In this study, the static analysis technique has been applied to malware samples to extract API calls, which is one of the most used features in machine/deep learning models as it represents the behavior of malware samples. Since the rapid increase and continuous evolution of malware affect the detection capacity of antivirus scanners, recent and updated datasets of malicious software became necessary to overcome this drawback. This paper introduces two new datasets: One with 14,616 samples obtained and compiled from VirusShare and one with 9,795 samples from VirusSample. In addition, benchmark results based on static API calls of malware samples are presented using several machine and deep learning models on these datasets. We believe that these two datasets and benchmark results enable researchers to test and validate their methods and approaches in this field.
翻译:目前,恶意软件和恶意软件的事故每天都在增加,即使有各种反病毒系统以及恶意软件的检测或分类方法。机器学习技术一直是安全专家发现恶意软件并确定其家庭的主要焦点。许多静态、动态和混合技术已经为此而出现。在本研究中,静态分析技术已应用于恶意软件样本,以提取API电话,这是机器/深层学习模型中最常用的特征之一,因为它代表恶意软件样本的行为。由于恶意软件的迅速增加和持续演变影响到抗病毒扫描仪的检测能力,因此,恶意软件的最新和更新数据集成为克服这一缺陷的必要。本文介绍了两个新的数据集:一个有14 616个样本,一个有9 795个样本,来自病毒抽样。此外,基于静态异常软件样本的基准结果是使用若干机器和这些数据集的深层学习模型。我们认为,这两个数据集和基准结果使研究人员能够测试和验证其在这一领域的方法和办法。