2015 IEEE International Conference on Automation Science and Engineering (CASE) 2015
DOI: 10.1109/coase.2015.7294263
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection via API calls, topic models and machine learning

Abstract: Dissemination of malicious code, also known as malware, poses severe challenges to cyber security. Malware authors embed software in seemingly innocuous executables, unknown to a user. The malware subsequently interacts with security-critical OS resources on the host system or network, in order to destroy their information or to gather sensitive information such as passwords and credit card numbers. Malware authors typically use Application Programming Interface (API) calls to perpetrate these crimes. We prese… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(11 citation statements)
references
References 23 publications
(27 reference statements)
0
9
0
Order By: Relevance
“…e work by Alazab et al [5] studied an automated method of extracting API call features and analysed them to understand their use for malicious purpose. Sundarkumar et al [6] presented a model, based on the types of API call sequences, using text mining and topic modeling to detect malware. Hachinyan [7] discussed proactive methods based on API call sequences analysis and proposed a method using a multiple sequence alignment to identify malware.…”
Section: Related Workmentioning
confidence: 99%
“…e work by Alazab et al [5] studied an automated method of extracting API call features and analysed them to understand their use for malicious purpose. Sundarkumar et al [6] presented a model, based on the types of API call sequences, using text mining and topic modeling to detect malware. Hachinyan [7] discussed proactive methods based on API call sequences analysis and proposed a method using a multiple sequence alignment to identify malware.…”
Section: Related Workmentioning
confidence: 99%
“…Where: TF = Term frequency IDF = Inverse document frequency As mentioned, TF-IDF is popular among the researchers when doing API call analysis. Among the researchers that use TF-IDF in their research is Sundarkumar et al (2015), Pektas and Acarman (2017), (Altawaier and Tiun, 2016) and (Bai et al, 2014).…”
Section: Term Frequencymentioning
confidence: 99%
“…They also use a soft clustering algorithm which is a non-Negative Matrix Factorization (NMF) to extract the API call topics which will be used to detect similar but unknown malware. Sundarkumar et al (2015) wrote that API level information inside the bytecode is beneficial to analyze software malevolence tendency since it shows the behavior of said executable which the API call sequence of. They also assert that the main problem in using Topic Model is the lots of choices in features, hence why, they propose to apply Latent Dirichl et al location (LDA) as a feature selection method in their research.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Sundarkumar et al [16] tried to use API information to characterize Android malware. They use text mining and topic modelling, combined with machine learning classifier, to detect malwares.…”
Section: Machine Learning Modelmentioning
confidence: 99%