2013
DOI: 10.1002/sec.869
|View full text |Cite
|
Sign up to set email alerts
|

Metamorphic malware detection using base malware identification approach

Abstract: Malware is a malicious program that is intentionally developed to harm computer systems. Because the metamorphic malwares are advanced in nature, they mutate their code in each generation by employing code obfuscation techniques to thwart detection. Conventional scanners even fail to detect all variants of such malware. In the view of metamorphic malware detection, we have proposed the concept of machine learning approach like support vector machine with histogram intersection kernel. It has been successfully … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(17 citation statements)
references
References 19 publications
0
17
0
Order By: Relevance
“…Earlier studies on metamorphic detection [3][4][5]14] mostly employed opcode-based feature extraction, which is applicable only in host-based detection because of the disassembly requirement. The proposed method overcomes it by extracting the features directly from binaries.…”
Section: Proposed Methods For Metamorphic Malware Detectionmentioning
confidence: 99%
See 3 more Smart Citations
“…Earlier studies on metamorphic detection [3][4][5]14] mostly employed opcode-based feature extraction, which is applicable only in host-based detection because of the disassembly requirement. The proposed method overcomes it by extracting the features directly from binaries.…”
Section: Proposed Methods For Metamorphic Malware Detectionmentioning
confidence: 99%
“…Some features in old metamorphic malware are kept unchanged in the mutated malware, as malware writers reuse old code segments [1]. Complete mutation of a metamorphic malware is deemed impossible due to the need to keep the same functionality [14]. Most versions of the same malware share a combination of several unchanged code segments [16].…”
Section: Proposed Methods For Metamorphic Malware Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, processing overhead (Carrillo and Lipman, 1988;Santos et al, 2013) and compiler optimisation (Alam et al, 2014a) are examples of challenges to be addressed when Opcode detection is utilised. Further, Opcode distribution has weakness against obfuscation techniques (Mahawer and Nagaraju, 2013;Alam et al, 2014a), and it cannot be used to detect unknown malware (Rezaei et al, 2014a). Vinod et al (2012) used Opcode sequences to calculate the similarity among malware executable files.…”
Section: A Operational Code (Opcode)mentioning
confidence: 99%