2016
DOI: 10.1587/transinf.2015cyp0007
|View full text |Cite
|
Sign up to set email alerts
|

Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call

Abstract: SUMMARYThe recent cyber-attacks utilize various malware as a means of attacks for the attacker's malicious purposes. They are aimed to steal confidential information or seize control over major facilities after infiltrating the network of a target organization. Attackers generally create new malware or many different types of malware by using an automatic malware creation tool which enables remote control over a target system easily and disturbs trace-back of these attacks. The paper proposes a generation meth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Kim et al used MSA to generate malware behavioral "feature-chain" patterns. 21 To deal with some obfuscation techniques, such as encoding, antivirtualization, and encapsulation, used by polymorphic worms, Kim et al implemented a detection system using API and MSA, 22 which achieved higher performance in terms of precision, accuracy, and false positive. The main drawback of these methods is that they need a huge amount of memory and have a high computational complexity.…”
Section: Content-based Signature Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…Kim et al used MSA to generate malware behavioral "feature-chain" patterns. 21 To deal with some obfuscation techniques, such as encoding, antivirtualization, and encapsulation, used by polymorphic worms, Kim et al implemented a detection system using API and MSA, 22 which achieved higher performance in terms of precision, accuracy, and false positive. The main drawback of these methods is that they need a huge amount of memory and have a high computational complexity.…”
Section: Content-based Signature Generationmentioning
confidence: 99%
“…This method adopts dynamic information of API call sequence patterns instead of malware's static information, such as file size, process, and it can even be used to detect new unknown malware. Kim et al used MSA to generate malware behavioral “feature‐chain” patterns 21 . To deal with some obfuscation techniques, such as encoding, antivirtualization, and encapsulation, used by polymorphic worms, Kim et al implemented a detection system using API and MSA, 22 which achieved higher performance in terms of precision, accuracy, and false positive.…”
Section: Related Workmentioning
confidence: 99%
“…1. For more explanation about each step, refer to our previous paper [5].  Data Collection & Sequence Extraction: Our malware samples had been collected from the web site such as "malshare.com" [3] and "VXVolt.net" [4].…”
Section: Functional Steps Of the Proposed Systemmentioning
confidence: 99%