Opcode Position A ware Metamorphic Malware Detection: Signature vs Histogram Approach

被引:0
|
作者
George, Nithil [1 ]
Vinod, P. [1 ]
机构
[1] SCMS Sch Engn & Technol, Dept Comp Sci & Engn, Karukutty, Ernakulam, India
关键词
bigrams; hamming distance; malware; metamorphism; smith waterman; sequence alignment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unlike the conventional approaches in the detection of metamorphic malware, a novel statistical non signature based detection technique is proposed. The proposed methodology aims to determine if alignment of locations or histogram of a specific opcode bigram is superior in the classification of metamorphic malware samples. In this work, we used Term Frequency-Inverse Document Frequency-Class Frequency (TF-IDF-CF) as feature selection method for synthesizing prominent features. Vector space models has been constructed by preserving hamming distance and Smith Waterman local sequence alignment score. Experiment results depicted that with Smith Waterman sequence alignment, best results were obtained with 300 significant malware features (94.01% accuracy, 92.24% F-measure, 100% precision and 49.89% recall). However, hamming distance based reference model, with 7 bigrams resulted in 100% precision, 99.76% accuracy, 99.71% F-measure and 99.42% recall.
引用
收藏
页码:1011 / 1017
页数:7
相关论文
共 12 条
  • [1] Heterogeneous Opcode Space for Metamorphic Malware Detection
    Raphel, Jithu
    Vinod, P.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 537 - 558
  • [2] Heterogeneous Opcode Space for Metamorphic Malware Detection
    Jithu Raphel
    P. Vinod
    [J]. Arabian Journal for Science and Engineering, 2017, 42 : 537 - 558
  • [3] Metamorphic malware detection using opcode frequency rate and decision tree
    Fazlali, Mahmood
    Khodamoradi, Peyman
    Mardukhi, Farhad
    Nosrati, Masoud
    Dehshibi, Mohammad Mahdi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (03) : 67 - 86
  • [4] Role-opcode vs. Opcode: the New method in Computer Malware Detection
    Ghezelbigloo, Zahra
    VafaeiJahan, Majid
    [J]. 2014 INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK), 2014,
  • [5] Metamorphic malware detection using base malware identification approach
    Mahawer, Devendra Kumar
    Nagaraju, A.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1719 - 1733
  • [6] CogramDroid-An approach towards malware detection in Android using opcode ngrams
    Bhat, Parnika
    Dutta, Kamlesh
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (20):
  • [7] G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families
    Khalilian, Alireza
    Nourazar, Amir
    Vahidi-Asl, Mojtaba
    Haghighi, Hassan
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 112 : 15 - 33
  • [8] SBRT: API Signature Behaviour Based Representation Technique for Improving Metamorphic Malware Detection
    Mohamed, Gamal A. N.
    Ithnin, Norafida Bte
    [J]. RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2018, 5 : 767 - 777
  • [9] SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language
    Fortino, Giancarlo
    Greco, Claudia
    Guzzo, Antonella
    Ianni, Michele
    [J]. COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 256 - 266
  • [10] RETRACTED: Analysis of Malware Detection and Signature Generation Using a Novel Hybrid Approach (Retracted Article)
    Dugyala, Raman
    Reddy, N. Hanuman
    Maheswari, V. Uma
    Mohammad, Gouse Baig
    Alenezi, Fayadh
    Polat, Kemal
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022