SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory

Chao Jing,Chaoyuan Cui,Yun Wu
DOI: https://doi.org/10.1109/tifs.2024.3407655
IF: 7.231
2024-06-14
IEEE Transactions on Information Forensics and Security
Abstract:API call sequence-based approaches are proven to have significant superiority in malware detection but generally overlook or evade two core issues: ( ) ignoring parameters and return values that contain more fine-grained security semantic sensitive information (SSSI) and ( ) handling lengthy API call sequences roughly, causing the poor interpretability and incompleteness of program behavior semantics. To effectively overcome these issues, we propose SIa-CBc, a sensitive intent-assisted and crucial behavior-cognized malware detection method leveraging human brain cognitive theory, which consists of two key modules. ( ) SIa divides the vast and heterogeneous SSSI space into a few categories, meanwhile representing the sensitive intents to assist API calls. ( ) CBc extracts crucial snippets from lengthy API call sequences via judgment and multi-step reasoning and further obtains their representations. The embedding representations from the previous two modules are concatenated as the input of ten representative baseline networks. Our experimental results indicate that SIa-CBc achieves an enhancement in malware detection accuracy ranging from 14.08% to 28.01%, reduces the average detection time per sample by 0.28 to 16.29 ms, and improves the defense against adversarial sample attacks by 4.86% to 55.04%. Moreover, SIa-CBc demonstrates outstanding performance compared to recent methods, not only limited to detection but also encompassing enhanced resilience to intricate adversarial tactics, thereby ensuring reliable protection without the need for frequent re-training. This underscores the model's innovative approach in leveraging human brain cognitive theory-based techniques for heightened security efficacy.
computer science, theory & methods,engineering, electrical & electronic
What problem does this paper attempt to address?