Threat Behavior Textual Search by Attention Graph Isomorphism

Chanwoo Bae, Guanhong Tao, Zhuo Zhang, Xiangyu Zhang


Abstract
Cyber attacks cause over $1 trillion loss every year. An important task for cyber security analysts is attack forensics. It entails understanding malware behaviors and attack origins. However, existing automated or manual malware analysis can only disclose a subset of behaviors due to inherent difficulties (e.g., malware cloaking and obfuscation). As such, analysts often resort to text search techniques to identify existing malware reports based on the symptoms they observe, exploiting the fact that malware samples share a lot of similarity, especially those from the same origin. In this paper, we propose a novel malware behavior search technique that is based on graph isomorphism at the attention layers of Transformer models. We also compose a large dataset collected from various agencies to facilitate such research.Our technique outperforms state-of-the-art methods, such as those based on sentence embeddings and keywords by 6-14%. In the case study of 10 real-world malwares, our technique can correctly attribute 8 of them to their ground truth origins while using Google only works for 3 cases.
Anthology ID:
2024.eacl-long.160
Volume:
Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics (Volume 1: Long Papers)
Month:
March
Year:
2024
Address:
St. Julian’s, Malta
Editors:
Yvette Graham, Matthew Purver
Venue:
EACL
SIG:
Publisher:
Association for Computational Linguistics
Note:
Pages:
2616–2630
Language:
URL:
https://aclanthology.org/2024.eacl-long.160
DOI:
Bibkey:
Cite (ACL):
Chanwoo Bae, Guanhong Tao, Zhuo Zhang, and Xiangyu Zhang. 2024. Threat Behavior Textual Search by Attention Graph Isomorphism. In Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics (Volume 1: Long Papers), pages 2616–2630, St. Julian’s, Malta. Association for Computational Linguistics.
Cite (Informal):
Threat Behavior Textual Search by Attention Graph Isomorphism (Bae et al., EACL 2024)
Copy Citation:
PDF:
https://preview.aclanthology.org/dois-2013-emnlp/2024.eacl-long.160.pdf
Video:
 https://preview.aclanthology.org/dois-2013-emnlp/2024.eacl-long.160.mp4