Complexity-based graph attention network for metamorphic malware detection

dc.contributor.authorBrezinski, Kenneth
dc.contributor.examiningcommitteeMcLeod, Bob (Electrical and Computer Engineering)
dc.contributor.examiningcommitteeMohammed, Noman (Computer Science)
dc.contributor.examiningcommitteeDansereau, Richard (Carleton University)
dc.contributor.supervisorFerens, Ken
dc.date.accessioned2024-08-19T14:03:33Z
dc.date.available2024-08-19T14:03:33Z
dc.date.issued2024-08-05
dc.date.submitted2024-08-05T22:05:49Zen_US
dc.date.submitted2024-08-19T04:20:47Zen_US
dc.degree.disciplineElectrical and Computer Engineering
dc.degree.levelDoctor of Philosophy (Ph.D.)
dc.description.abstractThis thesis work presents a new approach to malware analysis by creating a specialized sandbox environment for executing and monitoring malware on a host operating system. Over 200 malware samples, along with benignware, were tested in this environment. Application Programming Interface (API) calls were traced of how these executable interacted with the host system, which including registry changes, file system access, and thread activity. Two new methods to measure complexity, Mass Radius and Radius of Gyration Fractal Dimension (FD), were developed and added to a Deep Learning model. These complexity methods helped the model converge faster. Tests showed that the Mass Radius FD measure improved convergence and accuracy over the Radius of Gyration FD in identifying malware. The complexity models performed better than standard models across different datasets. The study also found that shorter sequences of API calls and file events were more likely to indicate malicious behavior. Using GNNExplainer, linked API sequences were linked to specific malware techniques, providing deeper insights into the model’s predictions. The complexity models identified flaws in traditional methods and successfully flagged malware that other commercial sandbox methods were not able to identify, lending credence to the sophistication and applicability of this work.
dc.description.noteOctober 2024
dc.identifier.urihttp://hdl.handle.net/1993/38391
dc.language.isoeng
dc.subjectDeep Learning
dc.subjectCyber Security
dc.subjectComplexity Analysis
dc.subjectMalware
dc.titleComplexity-based graph attention network for metamorphic malware detection
local.subject.manitobano
oaire.awardNumberIT15018
oaire.awardTitleMitacs Accelerate
oaire.awardURIhttps://www.mitacs.ca/our-programs/accelerate-core-business/
project.funder.nameMitacs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
KBrezinski-PhD Thesis Draft-revC.pdf
Size:
12.89 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
770 B
Format:
Item-specific license agreed to upon submission
Description: