Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness

Nitin Naik, Paul Jenkins, Roger Cooke, Jonathan Gillett, Yaochu Jin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Citations (Scopus)

Abstract

Emerging as a widely accepted technique for malware analysis, YARA rules due to its flexible and customisable nature, allows malware analysts to develop rules according to the requirements of a specific security domain. YARA rules can be automatically generated using tools, however, they may require post-processing for their optimisation, and may not be effective for the specific security domain. This compels the requirement to enhance automatically generated YARA rules and increase their effectiveness for malware analysis without increasing computational overheads. Reflecting on the above requirement, this paper initially evaluates automatically generated YARA rules using three YARA tools: yarGen, yaraGenerator and yabin. These tools are Python-based open-source tools used to generate YARA rules automatically utilising different underlying techniques. Subsequently, it proposes a method to enhance automatically generated YARA rules using a fuzzy hashing method. This proposed enhancement method can improve the effectiveness of YARA rules irrespective of the chosen YARA tool used to generate YARA rules, which is demonstrated through several experiments on samples of collected malware and goodware.

Original languageEnglish
Title of host publication2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1146-1153
Number of pages8
ISBN (Electronic)9781728125473
DOIs
Publication statusPublished - 1 Dec 2020
Externally publishedYes
Event2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 - Virtual, Canberra, Australia
Duration: 1 Dec 20204 Dec 2020

Publication series

Name2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020

Conference

Conference2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020
Country/TerritoryAustralia
CityVirtual, Canberra
Period1/12/204/12/20

Keywords

  • Fuzzy Hashing
  • Indicator of Compromise
  • IoC String.
  • Malware Analysis
  • Malware Analysis; YARA Rules; Fuzzy Hashing; yarGen
  • Ransomware
  • YARA Rules
  • yabin
  • yarGen, yaraGenerator
  • yaraGenerator; yabin; Ransomware; Indicator of Compromise; IoC String.

Cite this