Linux Malware Behavior Description
PDF

Palavras-chave

Malware
Linux
Reverse engineering

Como Citar

GALANTE, Lucas; GEUS, Paulo de; BOTACIN, Marcus. Linux Malware Behavior Description. Revista dos Trabalhos de Iniciação Científica da UNICAMP, Campinas, SP, n. 27, p. 1–1, 2019. DOI: 10.20396/revpibic2720192426. Disponível em: https://econtents.bc.unicamp.br/eventos/index.php/pibic/article/view/2426. Acesso em: 26 abr. 2024.

Resumo

A major threat to system’s security is malware infections, which cause financial and image losses to corporate and endusers, thus motivating the development of malware detectors. In this scenario, Machine Learning (ML) has been demonstrated to be a powerful technique to develop classifiers able to distinguish malware from goodware samples. However, many ML research work on malware detection focus only on the final detection accuracy rate and overlook other important aspects of classifier’s implementation and evaluation, such as feature extraction and parameter selection. In this project, we shed light to these aspects to highlight the challenges and drawbacks of ML-based malware classifiers development. We discovered that (i) dynamic features outperforms static features; (ii) Discrete-bounded features present smaller accuracy variance; (iii) Datasets presenting distinct characteristics impose generalization challenges to ML models; and (iv) Feature analysis can be used as feedback information for malware detection and infection prevention.

https://doi.org/10.20396/revpibic2720192426
PDF

Referências

Imran, M., Afzal, M., and Qadir, M. A. Journal of Intelligent & Fuzzy Systems, 2016, 31:837–847

Todos os trabalhos são de acesso livre, sendo que a detenção dos direitos concedidos aos trabalhos são de propriedade da Revista dos Trabalhos de Iniciação Científica da UNICAMP.

Downloads

Não há dados estatísticos.