Malware programs are diverse, with varying objectives, functionalities, and threat levels ranging from mere pop-ups to financial losses. Consequently, their run-time footprints across the system differ, impacting the optimal data source (Network, Operating system (OS), Hardware) and features that are instrumental to malware detection. Further, the variations in threat levels of malware classes affect the user requirements for detection. Thus, the optimal tuple of <data-source, features, user-requirements> is different for each malware class, impacting the state-of-the-art detection solutions that are agnostic to these subtle differences. This paper presents SUNDEW, a framework to detect malware classes using their optimal tuple of <data-source, features, user-requirements>. SUNDEW uses an ensemble of specialized predictors, each trained with a particular data source (network, OS, and hardware) and tuned for features and requirements of a specific class. While the specialized ensemble with a holistic view across the system improves detection, aggregating the independent conflicting inferences from the different predictors is challenging. SUNDEW resolves such conflicts with a hierarchical aggregation considering the threat-level, noise in the data sources, and prior domain knowledge. We evaluate SUNDEW on a real-world dataset of over 10,000 malware samples from 8 classes. It achieves an F1-Score of one for most classes, with an average of 0.93 and a limited performance overhead of 1.5%.
翻译:恶意软件程序多种多样,其目标、功能和威胁程度各不相同,从简单的弹出到财务损失不等。因此,它们在整个系统中的运行时间足迹各不相同,影响到最佳数据源(网络、操作系统(OS)、硬件)和有助于恶意软件检测的特征。此外,恶意软件类威胁程度的变化影响到用户的检测要求。因此,每个恶意软件类的最佳图纸(<数据源、功能、用户需求>)不同,影响到最先进的检测方法,而这些发现方法对于这些微妙的差异是不可知的。本文展示了SUNDEW,这是一个用来检测恶意软件类的框架,利用它们的最佳图纸 < 数据源、 特征、 用户需求> 和功能。此外,恶意软件类的威胁程度不同,每个经过特定数据源( 网络、操作系统和硬件) 培训,并适应特定类的特征和要求。虽然专门组群集与整个系统的整体视图改进了检测,将独立的相互矛盾的错误数据汇总到一个来自不同领域的系统级的系统内部数据, 也具有挑战性能评估。