Malware analysis using visualized images and entropy graphs Kyoung - - PowerPoint PPT Presentation

malware analysis using visualized images and entropy
SMART_READER_LITE
LIVE PREVIEW

Malware analysis using visualized images and entropy graphs Kyoung - - PowerPoint PPT Presentation

Malware analysis using visualized images and entropy graphs Kyoung Soo Han Jae Hyun Lim Boojoong Kang Eul Gyu Im Presented by Ruikai Zheng CISC850 Cyber Analytics 1.Introduction Malware variants developed using automated tools


slide-1
SLIDE 1

Malware analysis using visualized images and entropy graphs

Kyoung Soo Han · Jae Hyun Lim · Boojoong Kang · Eul Gyu Im Presented by Ruikai Zheng

CISC850 Cyber Analytics

slide-2
SLIDE 2

1.Introduction

  • Malware variants developed using automated tools
  • Automated tools reuse modules
  • Similarities may exist among malware variants
slide-3
SLIDE 3

2.General Idea

slide-4
SLIDE 4
  • 3. Bitmap Image
slide-5
SLIDE 5

Bitmap Image converter

slide-6
SLIDE 6

Some examples

slide-7
SLIDE 7
  • 4. Entropy graph
slide-8
SLIDE 8

Entropy graph generator

For each line of bitmap image: (suppose the image is 256 * 256)

slide-9
SLIDE 9
  • 5. Compute similarities
  • Align the x-axes(the heights of bitmap images) of

the two entropy graphs

slide-10
SLIDE 10
slide-11
SLIDE 11

Compute similarities

  • Compute K1 and K2

–K1

slide-12
SLIDE 12

Compute similarities

  • Compute K1 and K2

–K2

slide-13
SLIDE 13
slide-14
SLIDE 14

Compute similarities

  • Similarity value
slide-15
SLIDE 15

Experiment result

slide-16
SLIDE 16

Experiment result

slide-17
SLIDE 17

Experiment result

  • Threshold

–False positive rate –False negative rate

slide-18
SLIDE 18

Limitation

  • Malware applied with packing technique

– The entropy values of binaries can be very high – Packed malware binaries are difficult to classify

slide-19
SLIDE 19

Conclusion

  • The paper proposed a malware visualization method that

using binary grayscale bitmap images and entropy graphs.

  • The paper proposed a method to calculate similarities of

malware to classify malware families.

  • Experimental results showed that proposed method can

classify malware families with a small false-positive/false - negative rate.

slide-20
SLIDE 20

Thank you