DaCoMM: Detection and Classification of Metamorphic Malware

被引:6
|
作者
Mehra, Vishakha [1 ]
Jain, Vinesh [2 ]
Uppal, Dolly [1 ]
机构
[1] Rajasthan Tech Univ, Kota, India
[2] Govt Engn Coll, Ajmer, Rajasthan, India
关键词
metamorphic malware; polymorphic malware; mutation engine; code obfuscation; histogram;
D O I
10.1109/CSNT.2015.62
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
with the fast and vast upliftment of IT sector in 21st century, the question for system security also counts. As on one side, the IT field is growing with positivity, malware attacks are also arising on the other. Hence, a great challenge for zero day malware attack. Also, malware authors of metamorphic malware and polymorphic malware gain an extra advantage through mutation engine and virus generation toolkits as they can produce as many malware as they want. Our approach focuses on detection and classification of metamorphic malware according to their families. MM are hardest to detect by Antivirus Scanners because they differ structurally. We had gathered a total of 600 malware including those also that bypasses the AVS and 150 benign files. These files are disassembled, preprocessed, control flow graphs and API call graphs are generated. We had proposed an algorithm-Gourmand Feature Selection algorithm for selecting desired features from call graphs. Classification is done through WEKA tool, for which J-48 has given the most accuracy of 99.10%. Once the metamorphic malware are detected, they are classified according to their families using the histograms and Chi-square distance measurement formula.
引用
收藏
页码:668 / 673
页数:6
相关论文
共 50 条
  • [1] Classification and Detection of Metamorphic Malware using Value Set Analysis
    Leder, Felix
    Steinbock, Bastian
    Martini, Peter
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 39 - 46
  • [2] Metamorphic Detection of Repackaged Malware
    Singh, Shirish
    Kaiser, Gail
    [J]. 2021 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON METAMORPHIC TESTING (MET 2021), 2021, : 9 - 16
  • [3] A Novel Framework for Metamorphic Malware Detection
    Jha A.K.
    Vaish A.
    Patil S.
    [J]. SN Computer Science, 4 (1)
  • [4] Frequency Based Metamorphic Malware Detection
    Carkaci, Necmettin
    Sogukpmar, Ibrahim
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 421 - 424
  • [5] Discriminant Features for Metamorphic Malware Detection
    Kuriakose, Jikku
    Vinod, P.
    [J]. 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 406 - 411
  • [6] Metamorphic malware detection using base malware identification approach
    Mahawer, Devendra Kumar
    Nagaraju, A.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1719 - 1733
  • [7] Nonnegative matrix factorization and metamorphic malware detection
    Ling, Yeong Tyng
    Sani, Nor Fazlida Mohd
    Abdullah, Mohd Taufik
    Hamid, Nor Asilah Wati Abdul
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (03) : 195 - 208
  • [8] Metamorphic Malware Detection Using Code Metrics
    Canfora, Gerardo
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    Di Notte, Paolo
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (03): : 57 - 67
  • [9] Nonnegative matrix factorization and metamorphic malware detection
    Yeong Tyng Ling
    Nor Fazlida Mohd Sani
    Mohd Taufik Abdullah
    Nor Asilah Wati Abdul Hamid
    [J]. Journal of Computer Virology and Hacking Techniques, 2019, 15 : 195 - 208
  • [10] Classification of polymorphic and metamorphic malware samples based on their behavior
    Tsyganok, Ksenia
    Tumoyan, Evgeny
    Anikeev, Maxim
    Babenko, Liudmila
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 111 - 116