International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 176 - Number 22 |
Year of Publication: 2020 |
Authors: Harshal R. Shinde, Himanshu Shukla, A. Jothimani, Anurag Singh Baghel |
10.5120/ijca2020920200 |
Harshal R. Shinde, Himanshu Shukla, A. Jothimani, Anurag Singh Baghel . File Checker: Determining Behavioural Signatures of an Executable Binary to Detect Malware. International Journal of Computer Applications. 176, 22 ( May 2020), 15-20. DOI=10.5120/ijca2020920200
The increasing dependency in this technologically advancing world on data is making us vulnerable to frequent cyber-attacks. This study aims at classifying executable binaries(Portable Executable files) based on its run-time behaviour. Traditional approaches to detecting windows-based malware include comparing files hashes, strings, etc., which clearly failed to detect the new world malware kinds - morphed and obfuscated. Although the dynamically based detection distinctly outperformed static based detection techniques, it failed to effectively detect advanced malicious programs. System-call injection attacks usually inject irrelevant calls to alter an execution sequence of malware, thereby making it undetectable to calls based detection systems. The proposed method aims at extracting traces of API calls made to generate possible unique alternative traces in order to detect other malicious API patterns which may be left out due to prevent call injection attacks. A classification model is built by employing the RandomForest algorithm, and its efficiency is compared with other baseline classifiers. This model classifies the data effectively with 91.9% accuracy.