2018
DOI: 10.1007/978-3-030-01689-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Malware Families Based on Runtime Behaviour

Abstract: This paper distinguishes malware families from a specific category (i.e., ransomware) via dynamic analysis. We collect samples from four ransomware families and use Cuckoo sandbox environment, to observe their runtime behaviour. This study aims to provide new insight into malware family classification by comparing possible runtime features, and application of different extraction and selection techniques on them. As we try many extraction models on call traces such as bag-ofwords, ngram sequences and wildcard … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…The traditional malware classification is mostly based on the host behavior of malware [19]- [21], for example, API-call sequences or created processes. On the basis of these features, the classification methods are constantly updated.…”
Section: Related Work a Malware Analysis-based Methodsmentioning
confidence: 99%
“…The traditional malware classification is mostly based on the host behavior of malware [19]- [21], for example, API-call sequences or created processes. On the basis of these features, the classification methods are constantly updated.…”
Section: Related Work a Malware Analysis-based Methodsmentioning
confidence: 99%
“…Geden Happa (2018) in [32] conducted an experiment to classify particular malware into malware families from the outcomes of dynamic behaviour analysis. For their experiment, they established an automated dynamic malware analysis platform with the help of the Cuckoo tool.…”
Section: Related Work and Backgroundmentioning
confidence: 99%