• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints


Jun-ho Hwang, Seon-bin Hwang, Su-jeong Kim, Tae-jin Lee, Journal of Internet Computing and Services, Vol. 19, No. 5, pp. 21-31, Oct. 2018
10.7472/jksii.2018.19.5.21, Full Text:
Keywords: Malware, Static Analysis, deep neural network

Abstract

Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Hwang, J., Hwang, S., Kim, S., & Lee, T. (2018). Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints. Journal of Internet Computing and Services, 19(5), 21-31. DOI: 10.7472/jksii.2018.19.5.21.

[IEEE Style]
J. Hwang, S. Hwang, S. Kim, T. Lee, "Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints," Journal of Internet Computing and Services, vol. 19, no. 5, pp. 21-31, 2018. DOI: 10.7472/jksii.2018.19.5.21.

[ACM Style]
Jun-ho Hwang, Seon-bin Hwang, Su-jeong Kim, and Tae-jin Lee. 2018. Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints. Journal of Internet Computing and Services, 19, 5, (2018), 21-31. DOI: 10.7472/jksii.2018.19.5.21.