2010 IEEE International Conference on Communications 2010
DOI: 10.1109/icc.2010.5501969
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection

Abstract: The major contribution of this paper is two-folds: (1) we present our novel variable-length system call representation scheme compared to existing fixed-length sequence schemes, and (2) using this representation, we present our in-execution malware detector that can not only identify zero-day malware without any a priori knowledge but can also detect a malicious process while it is executing. Our representation scheme -a more generalized version of n-gram -can be visualized in a k-dimensional hyperspace in whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…The authors in [15] proposed an enhanced variant of the above-mentioned approach known as hypergrams which represent variable length system call sequences in in-execution malware analysis and detection. A Hyperspace which is kdimensional is used to visualize the n-grams where k is the number of unique system call sequences of a process in its execution.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [15] proposed an enhanced variant of the above-mentioned approach known as hypergrams which represent variable length system call sequences in in-execution malware analysis and detection. A Hyperspace which is kdimensional is used to visualize the n-grams where k is the number of unique system call sequences of a process in its execution.…”
Section: Related Workmentioning
confidence: 99%
“…F alseP ositiveRate (F P R) = F P/(T N + F P ) ( 8 ) where, TP-True Positives which represent the number of correctly identified malware instances, TN-True Negatives which denote correctly classified benign samples whereas FP-False Positives designate misclassified benign files and FNFalse Negatives represents misclassified malware instances.…”
Section: Evaluation Measuresmentioning
confidence: 99%
“…The authors in [8] proposed a new approach known as hypergrams to represent variable length system call sequences for in-execution malware analysis and detection. A k -dimensional hyperspace was used to visualize the n-grams where, k represents the number of unique system call sequences of a program in execution.…”
Section: Related Workmentioning
confidence: 99%
“…Representation of malware basically deals with how the collected malware samples are being transformed from specific format to another by applying certain techniques to represent them such as a system call representation technique (Mehdi et al, 2010) and Opcode sequences as representation of executable datamining-based (Santos et al, 2013). In this study, besides providing the researchers with full and comprehensive literature on malware definitions, types, various detection techniques and methods, we aim at giving researchers an idea about various techniques that are used for representing the malware samples as we will conduct a deep survey on some representations that are based on the major malware detection techniques.…”
Section: Introductionmentioning
confidence: 99%
“…In the case of the malware infecting executable codes when this happen the file or files got infected will be residing in memory the moment the user executes them and hence they will infect any other files that the user may execute afterwards. It has a tremendous negative impact on the computer security (Mehdi et al, 2010). With the use of antivirus programs and firewall many malware could be defeated "to some extent" especially those been very active through the network, but at the same time, if we disable the use of antivirus and firewalls for a single day, this may show strong proof of the fast spread of this malicious software.…”
Section: Introductionmentioning
confidence: 99%