2014 IEEE Network Operations and Management Symposium (NOMS) 2014
DOI: 10.1109/noms.2014.6838251
|View full text |Cite
|
Sign up to set email alerts
|

RevMatch: An efficient and robust decision model for collaborative malware detection

Abstract: This work falls in the area of collaborative malware detection systems which rely on expertise and knowledge from multiple different antivirus software for malware detection. A critical component of such systems is the collaborative malware detection decision process. In this paper, we propose a novel decision model, RevMatch, where collaborative malware decisions are made based on labeled malware detection history from participating antiviruses. We evaluate our proposal using real-world malware data sets and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 11 publications
(14 reference statements)
0
12
0
Order By: Relevance
“…The studies [48][49][50] utilized software and resource architecture using the model-based sequence, clustering algorithm, and the Bayesian information criterion by Lamba et al [48], while S. Young and Dahnert [49] used the Bayesian belief network to propose a DevEyes Framework that has the capability to identify potential user actions, and in work [50], Clark et al focused on the identification, characterization, and modeling of unintended USB channels. White and Panda's [51] proposed criticality score is based on the content sensitivity of the data item using SVM, the naive Bayes network is used to model the user's behavior information by the client, including the called process and its corresponding threads when the user is normally working [52], and a decision model called named RevMatch is proposed [53]. RevMatch made a decision based on the history of the labeled malware detection.…”
Section: Analyzed Behaviorsmentioning
confidence: 99%
“…The studies [48][49][50] utilized software and resource architecture using the model-based sequence, clustering algorithm, and the Bayesian information criterion by Lamba et al [48], while S. Young and Dahnert [49] used the Bayesian belief network to propose a DevEyes Framework that has the capability to identify potential user actions, and in work [50], Clark et al focused on the identification, characterization, and modeling of unintended USB channels. White and Panda's [51] proposed criticality score is based on the content sensitivity of the data item using SVM, the naive Bayes network is used to model the user's behavior information by the client, including the called process and its corresponding threads when the user is normally working [52], and a decision model called named RevMatch is proposed [53]. RevMatch made a decision based on the history of the labeled malware detection.…”
Section: Analyzed Behaviorsmentioning
confidence: 99%
“…Whereas in our context, IDSs may not be involved in all intrusion detections and the collected responses may come each time from different groups of IDSs. In the work of RevMatch [4], a machine learning approach is used to make collaborative decision. However, this only works for a centralized collaboration model.…”
Section: Related Workmentioning
confidence: 99%
“…Although most IDSs adopt both technologies to have enhanced detection capability, their detection capability is limited by the amount of knowledge their security vendors have, such as the coverage of signature database. Research [4] shows that a single Antivirus vendor has very limited detection rate (up to 60% for newer malware) and collaborative detection can improve the detection rate significantly. Through collaboration, IDSs can utilize the expertise from various vendors to improve the coverage of known attacks.…”
Section: Introductionmentioning
confidence: 99%
“…To tackle the above-mentioned challenges, the computer security researchers have shifted to collaborative approaches [8], [12]- [14], whose main goal is to make different Anti-Virus (AV) tools collaborate and federate their efforts in order to increase the overall detection accuracy, and decrease the required time to feed the viral database with malware signatures. Indeed, collaboration allows, on one hand, to reduce the false positives that are produced when AV tools are not assisted by other sources confirming the alerts about a specific file.…”
Section: Introductionmentioning
confidence: 99%