通过内存分析进行恶意软件检测 / Malware Detection Through Memory Analysis
1️⃣ 一句话总结
本研究利用内存分析数据集,通过XGBoost模型实现了高效的恶意软件检测,在区分恶意与良性软件时准确率高达99.98%,并能进一步识别勒索软件、间谍软件等具体恶意软件类型,为开发实时、准确的恶意软件防护工具提供了支持。
This paper summarizes the research conducted for a malware detection project using the Canadian Institute for Cybersecurity's MalMemAnalysis-2022 dataset. The purpose of the project was to explore the effectiveness and efficiency of machine learning techniques for the task of binary classification (i.e., benign or malicious) as well as multi-class classification to further include three malware sub-types (i.e., benign, ransomware, spyware, or Trojan horse). The XGBoost model type was the final model selected for both tasks due to the trade-off between strong detection capability and fast inference speed. The binary classifier achieved a testing subset accuracy and F1 score of 99.98\%, while the multi-class version reached an accuracy of 87.54\% and an F1 score of 81.26\%, with an average F1 score over the malware sub-types of 75.03\%. In addition to the high modelling performance, XGBoost is also efficient in terms of classification speed. It takes about 37.3 milliseconds to classify 50 samples in sequential order in the binary setting and about 43.2 milliseconds in the multi-class setting. The results from this research project help advance the efforts made towards developing accurate and real-time obfuscated malware detectors for the goal of improving online privacy and safety. *This project was completed as part of ELEC 877 (AI for Cybersecurity) in the Winter 2024 term.
通过内存分析进行恶意软件检测 / Malware Detection Through Memory Analysis
本研究利用内存分析数据集,通过XGBoost模型实现了高效的恶意软件检测,在区分恶意与良性软件时准确率高达99.98%,并能进一步识别勒索软件、间谍软件等具体恶意软件类型,为开发实时、准确的恶意软件防护工具提供了支持。
源自 arXiv: 2602.02184