A framework for metamorphic malware analysis and real-time detection

被引:46
|
作者
Alam, Shahid [1 ]
Horspool, R. Nigel [1 ]
Traore, Issa [2 ]
Sogukpinar, Ibrahim [3 ]
机构
[1] Univ Victoria, Dept Comp Sci, Victoria, BC V8P5C2, Canada
[2] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8P5C2, Canada
[3] Gebze Inst Technol, Dept Comp Engn, TR-41400 Gebze, Kocaeli, Turkey
关键词
End point security; Malware analysis; Malware detection; Metamorphic malware; Window of difference; Control flow analysis; Heuristics; Data mining; OBFUSCATION; MODEL;
D O I
10.1016/j.cose.2014.10.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware writers change the obfuscations (syntax) more than the behavior (semantic) of such a new malware. On this assumption and motivation, this paper presents a new framework named MARD for Metamorphic Malware Analysis and Real-Time Detection. As part of the new framework, to build a behavioral signature and detect metamorphic malware in real-time, we propose two novel techniques, named ACFG (Annotated Control Flow Graph) and SWOD-CFWeight (Sliding Window of Difference and Control Flow Weight). Unlike other techniques, ACFG provides a faster matching of CFGs, without compromising detection accuracy; it can handle malware with smaller CFGs, and contains more information and hence provides more accuracy than a CFG. SWOD-CFWeight mitigates and addresses key issues in current techniques, related to the change of the frequencies of opcodes, such as the use of different compilers, compiler optimizations, operating systems and obfuscations. The size of SWOD can change, which gives. anti-malware tool developers the ability to select appropriate parameter values to further optimize malware detection. CFWeight captures the control flow semantics of a program to an extent that helps detect metamorphic malware in real-time. Experimental evaluation of the two proposed techniques, using an existing dataset, achieved detection rates in the range 94%-99.6%. Compared to ACFG, SWOD-CFWeight significantly improves the detection time, and is suitable to be used where the time for malware detection is more important as in real-time (practical) anti-malware applications. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:212 / 233
页数:22
相关论文
共 50 条
  • [31] Metamorphic Testing for Edge Real-Time Face Recognition and Intrusion Detection Solution
    Raif, Mourad
    Ouafiq, El Mehdi
    El Rharras, Abdessamad
    Chehri, Abdellah
    Saadane, Rachid
    [J]. 2022 IEEE 96TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-FALL), 2022,
  • [32] PhD Forum: Deep Learning-based Real-Time Malware Detection with Multi-Stage Analysis
    Yuan, Xiaoyong
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 243 - 244
  • [33] Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence
    Thanh Nguyen Vu
    Toan Tan Nguyen
    Hieu Phan Trung
    Thao Do Duy
    Ke Hoang Van
    Tuan Dinh Le
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 262 - 272
  • [34] Ranked Linear Discriminant Analysis Features for Metamorphic Malware Detection
    Kuriakose, Jikku
    Vinod, P.
    [J]. SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 112 - 117
  • [35] Classification and Detection of Metamorphic Malware using Value Set Analysis
    Leder, Felix
    Steinbock, Bastian
    Martini, Peter
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 39 - 46
  • [36] pAElla: Edge AI-Based Real-Time Malware Detection in Data Centers
    Libri, Antonio
    Bartolini, Andrea
    Benini, Luca
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10): : 9589 - 9599
  • [37] SCREDENT: Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices
    McNeil, Paul
    Shetty, Sachin
    Guntu, Divya
    Barve, Gauree
    [J]. 7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 1219 - 1225
  • [38] A Dynamic Ensemble Learning Framework for Data Stream Analysis and Real-Time Threat Detection
    Demertzis, Konstantinos
    Iliadis, Lazaros
    Anezakis, Vardis-Dimitris
    [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2018, PT I, 2018, 11139 : 669 - 681
  • [39] DaCoMM: Detection and Classification of Metamorphic Malware
    Mehra, Vishakha
    Jain, Vinesh
    Uppal, Dolly
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 668 - 673
  • [40] Frequency Based Metamorphic Malware Detection
    Carkaci, Necmettin
    Sogukpmar, Ibrahim
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 421 - 424