DaCoMM: Detection and Classification of Metamorphic Malware

被引:6
|
作者
Mehra, Vishakha [1 ]
Jain, Vinesh [2 ]
Uppal, Dolly [1 ]
机构
[1] Rajasthan Tech Univ, Kota, India
[2] Govt Engn Coll, Ajmer, Rajasthan, India
关键词
metamorphic malware; polymorphic malware; mutation engine; code obfuscation; histogram;
D O I
10.1109/CSNT.2015.62
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
with the fast and vast upliftment of IT sector in 21st century, the question for system security also counts. As on one side, the IT field is growing with positivity, malware attacks are also arising on the other. Hence, a great challenge for zero day malware attack. Also, malware authors of metamorphic malware and polymorphic malware gain an extra advantage through mutation engine and virus generation toolkits as they can produce as many malware as they want. Our approach focuses on detection and classification of metamorphic malware according to their families. MM are hardest to detect by Antivirus Scanners because they differ structurally. We had gathered a total of 600 malware including those also that bypasses the AVS and 150 benign files. These files are disassembled, preprocessed, control flow graphs and API call graphs are generated. We had proposed an algorithm-Gourmand Feature Selection algorithm for selecting desired features from call graphs. Classification is done through WEKA tool, for which J-48 has given the most accuracy of 99.10%. Once the metamorphic malware are detected, they are classified according to their families using the histograms and Chi-square distance measurement formula.
引用
收藏
页码:668 / 673
页数:6
相关论文
共 50 条
  • [31] Automatic malware classification and new malware detection using machine learning
    Liu, Liu
    Wang, Bao-sheng
    Yu, Bo
    Zhong, Qiu-xi
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (09) : 1336 - 1347
  • [32] Automatic malware classification and new malware detection using machine learning
    Liu Liu
    Bao-sheng Wang
    Bo Yu
    Qiu-xi Zhong
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1336 - 1347
  • [33] MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining
    Nawaz, M. Saqib
    Fournier-Viger, Philippe
    Nawaz, M. Zohaib
    Chen, Guoting
    Wu, Youxi
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [34] Detection of metamorphic and virtualization-based malware using algebraic specification
    Webster, Matt
    Malcolm, Grant
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (03): : 221 - 245
  • [35] Pruned Feature Space for Metamorphic Malware Detection using Markov Blanket
    Raphel, Jithu
    Vinod, P.
    [J]. 2015 EIGHTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2015, : 377 - 382
  • [36] Metamorphic malware detection using opcode frequency rate and decision tree
    Fazlali, Mahmood
    Khodamoradi, Peyman
    Mardukhi, Farhad
    Nosrati, Masoud
    Dehshibi, Mohammad Mahdi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (03) : 67 - 86
  • [37] Metamorphic Malware Detection Using Linear Discriminant Analysis and Graph Similarity
    Mirzazadeh, Reza
    Moattar, Mohammad Hossein
    Jahan, Majid Vafaei
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2015, : 61 - 66
  • [38] MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection
    Alam, Shahid
    Horspool, R. Nigel
    Traore, Issa
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 480 - 489
  • [39] An Effective Memory Analysis for Malware Detection and Classification
    Sihwail, Rami
    Omar, Khairuddin
    Ariffin, Khairul Akram Zainol
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2301 - 2320
  • [40] Malware Attacks on Smartphones and Their Classification Based Detection
    Gupta, Anand
    Dutta, Spandan
    Mangla, Vivek
    [J]. CONTEMPORARY COMPUTING, 2011, 168 : 242 - 253