Further Experiments in Biocomputational Structural Analysis of Malware

被引:0
|
作者
Naidu, Vijay [1 ]
Narayanan, Ajit [1 ]
机构
[1] Auckland Univ Technol, Sch Comp & Math Sci, Auckland, New Zealand
关键词
malware structural analysis; malware modelling; Blaster worm; automatic signature generation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Initial work on structural analysis of malware using the nature-inspired technique of projecting malware signatures into the amino acid/protein domain was promising in a number of ways, including the demonstration of potential links with real-world pathogen proteins. That initial work was necessarily speculative and limited by a number of experimental factors. The aim of the research reported here is to address some of these limitations and to repeat, with malware code and signatures that can be assured as genuine, the experiments previously reported but with enhancements and improvements. Intriguingly, the outcome is the same: for some reason that is not yet known, matching artificial malware code consensuses after multiple alignment against protein databases returns a high proportion of naturally occurring viral proteins.
引用
收藏
页码:605 / 610
页数:6
相关论文
共 50 条
  • [31] Further analysis of the electron cyclotron current drive experiments on RTP
    Westerhof, E
    Polman, RW
    Hogeweij, GMD
    Lok, J
    Min, E
    Oomens, AAM
    Schüller, FC
    FUSION ENGINEERING AND DESIGN, 2001, 53 (1-4) : 259 - 266
  • [32] FURTHER DIFFICULTIES IN THE ANALYSIS OF FUNCTIONAL-RESPONSE EXPERIMENTS AND A RESOLUTION
    WILLIAMS, FM
    JULIANO, SA
    CANADIAN ENTOMOLOGIST, 1985, 117 (05): : 631 - 640
  • [33] Biocomputational Characterization and Evolutionary Analysis of Bubaline Dicer1 Enzyme
    Singh, Jasdeep
    Mukhopadhyay, Chandra Sekhar
    Arora, Jaspreet Singh
    Kaur, Simarjeet
    ASIAN-AUSTRALASIAN JOURNAL OF ANIMAL SCIENCES, 2015, 28 (06): : 876 - 887
  • [34] Structural Classification and Similarity Measurement of Malware
    Shi, Hongbo
    Hamagami, Tomoki
    Yoshioka, Katsunari
    Xu, Haoyuan
    Tobe, Kazuhiro
    Goto, Shigeki
    IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2014, 9 (06) : 621 - 632
  • [35] Firing Experiments and Structural Analysis of Human Body
    Lee, Se-Hoon
    Lee, Young-Shin
    Choi, Young-Jin
    Choi, Eui-Jung
    Chae, Je-Wook
    TRANSACTIONS OF THE KOREAN SOCIETY OF MECHANICAL ENGINEERS A, 2007, 31 (07) : 764 - 776
  • [36] An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency
    Jadhav, Suyash
    Oh, Tae
    Jeong, Jaehoon
    Kim, Young Ho
    Kim, Jeong Neyo
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 370 - 374
  • [37] DLLMiner: structural mining for malware detection
    Narouei, Masoud
    Ahmadi, Mansour
    Giacinto, Giorgio
    Takabi, Hassan
    Sami, Ashkan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3311 - 3322
  • [38] Further structural analysis of GnRH complexes with metal ions
    Nakamura, K
    Kodaka, M
    El-Mehasseb, IM
    Gajewska, A
    Okuno, H
    Ochwanowska, E
    Witek, B
    Kozlowski, H
    Kochman, K
    NEUROENDOCRINOLOGY LETTERS, 2005, 26 (03) : 247 - 252
  • [39] IoT Malware Analysis
    Clincyl, Victor
    Shahriar, Hussain
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 920 - 921
  • [40] Malware behaviour analysis
    Wagener, Gerard
    State, Radu
    Dulaunoy, Alexandre
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (04): : 279 - 287