Ranked Linear Discriminant Analysis Features for Metamorphic Malware Detection

被引:0
|
作者
Kuriakose, Jikku [1 ]
Vinod, P. [1 ]
机构
[1] SCMS Sch Engn & Technol, Dept Comp Sci & Engn, Karukutty, Ernakulam, India
关键词
metamorphic malware; linear discriminant analysis; obfuscation; optimal features;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Metamorphic malware modifies the code of every new offspring by using code obfuscation techniques. Recent research have depicted that metamorphic writers make use of benign dead code to thwart signature and Hidden Markov based detectors. Failure in the detection is due to the fact that the malware code appear statistically similar to benign programs. In order to detect complex malware generated with hacker generated tool i.e. NGVCK known to the research community, and the intricate metamorphic worm available as benchmark data we propose, a novel approach using Linear Discriminant Analysis (LDA) to rank and synthesize most prominent opcode hi-gram features for identifying unseen malware and benign samples. Our investigation resulted in 99.7% accuracy which reveals that the current method could be employed to improve the detection rate of existing malware scanner available in public.
引用
收藏
页码:112 / 117
页数:6
相关论文
共 50 条
  • [1] Discriminant Features for Metamorphic Malware Detection
    Kuriakose, Jikku
    Vinod, P.
    [J]. 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 406 - 411
  • [2] Metamorphic Malware Detection Using Linear Discriminant Analysis and Graph Similarity
    Mirzazadeh, Reza
    Moattar, Mohammad Hossein
    Jahan, Majid Vafaei
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2015, : 61 - 66
  • [3] X-ANOVA Ranked Features for Android Malware Analysis
    Raphael, Rincy
    Vinod, P.
    Omman, Bini
    [J]. 2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [4] Structural features with nonnegative matrix factorization for metamorphic malware detection
    Ling, Yeong Tyng
    Sani, Nor Fazlida Mohd
    Abdullah, Mohd Taufik
    Hamid, Nor Asilah Wati Abdul
    [J]. COMPUTERS & SECURITY, 2021, 104
  • [5] Metamorphic Detection of Repackaged Malware
    Singh, Shirish
    Kaiser, Gail
    [J]. 2021 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON METAMORPHIC TESTING (MET 2021), 2021, : 9 - 16
  • [6] Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence
    Thanh Nguyen Vu
    Toan Tan Nguyen
    Hieu Phan Trung
    Thao Do Duy
    Ke Hoang Van
    Tuan Dinh Le
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 262 - 272
  • [7] A framework for metamorphic malware analysis and real-time detection
    Alam, Shahid
    Horspool, R. Nigel
    Traore, Issa
    Sogukpinar, Ibrahim
    [J]. COMPUTERS & SECURITY, 2015, 48 : 212 - 233
  • [8] Classification and Detection of Metamorphic Malware using Value Set Analysis
    Leder, Felix
    Steinbock, Bastian
    Martini, Peter
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 39 - 46
  • [9] DaCoMM: Detection and Classification of Metamorphic Malware
    Mehra, Vishakha
    Jain, Vinesh
    Uppal, Dolly
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 668 - 673
  • [10] A Novel Framework for Metamorphic Malware Detection
    Jha A.K.
    Vaish A.
    Patil S.
    [J]. SN Computer Science, 4 (1)