back to article Infosec brainiacs release public dataset to classify new malware using AI

Researchers at Endgame, a cyber-security biz based in Virginia, have published what they believe is the first large open-source dataset for machine learning malware detection known as EMBER. EMBER contains metadata describing 1.1 million Windows portable executable files: 900,000 training samples evenly split into malicious, …

  1. J. R. Hartley

    No fate

    No fate but what we make.

  2. elDog

    Like telling if someone is good or bad by looking at their face

    Or judging a book by its cover.

    Malware is more of a perspective from the POV of the infectee.

    Viruses (and sperm/etc.) think they are good things. Without them, we wouldn't be here.

  3. Death_Ninja

    Interesting sort of

    Various security vendors have already done this sort of thing using both supervised and unsupervised machine learning algorithms.

    There are numerous products out there for some time using it.

    In case you hadn't noticed, it hasn't stopped malware yet, because it never will.

    Its always offence vs defence and a new defence spawns a new offensive technology. Given both the rewards and the players involved, it always will be an endless war.

  4. Pascal Monett Silver badge

    Antivirus needs a different approach

    Signature-based protection is an after-the-fact approach - you have to have the virus locally before a signature-base AV can scan it, and that means you run the risk of triggering it before the AV can check out the file.

    Instead of using signatures, an activity-base approach might be better. On a clean system, the AV creates a record of legitimate programs and kernel programs. After that, anything trying to modify those files is stopped cold, with a warning. Any process trying to access memory it shouldn't is frozen and quarantined. Any new application installed is sandboxed until its activity has been thoroughly analyzed and found acceptable, then it stands a chance of being whitelisted. Any whitelisted program trying to modify the kernel generates a warning for the user before the modification is allowed to complete.

    Of course, the problem with this approach is that security is basically user-based, so the user has to know what he is doing.

    And with that I realize that I have just shot down my own theory. Bugger.

    1. Death_Ninja

      Re: Antivirus needs a different approach

      Whitelisting doesn't work for most environments, particularly if the user is responsible for the whitelist adding...

      Sandboxing is increasingly defeated by modern malware too after big organisations deployed thinks like FireEye, Wildfire etc etc.

  5. Alan J. Wylie

    The "evil bit".

    “There is no evil bit" is a reference to an April-the-first RFC: 3514

    we define a security flag, known as the "evil" bit, in the IPv4 [RFC791] header. Benign packets have this bit set to 0; those that are used for an attack will have the bit set to 1.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like