Enhanced Detection of Advanced Malicious Software

被引:0
|
作者
Fraley, James B. [1 ]
Cannady, James [1 ]
机构
[1] Nova Southeastern Univ, Coll Engn & Comp, Ft Lauderdale, FL 33314 USA
关键词
Belief Propagation; data mining; dynamic analysis; Locality Sensitive Hashing; malware detection; and static analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last year the number of polymorphic and metamorphic malware samples seen in the wild has grown exponentially. The development of signatures for defensive purposes simply cannot keep up with the pace of these new malware attacks. New and sophisticated malware have been able to bypass network protection infrastructures to deliver attacks on the intended target. The network defense apparatus which relies on signature-based detection finds itself practically useless and unable to protect networks, platforms and data. This paper describes a novel approach to detect polymorphic and metamorphic malware. Our approach uses a unique method of leveraging multidimensional topological data with advanced clustering techniques for network detection. The results of our initial research and a discussion of future research possibilities are also presented.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Research On Detection Of Malicious Software
    Peng, Boyuan
    2021 2ND INTERNATIONAL CONFERENCE ON E-COMMERCE AND INTERNET TECHNOLOGY (ECIT 2021), 2021, : 400 - 403
  • [2] Detection of Malicious Software Engineer Intrusion
    Shin, Michael E.
    Patel, Nipul
    Sethia, Snehadeep
    22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 565 - 570
  • [3] Malicious Code Detection Based on Software Fingerprint
    Yin, Zhimin
    Yu, Xiangzhan
    Niu, Linhua
    PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (ICAISE 2013), 2013, 37 : 212 - 216
  • [4] A novel testbed for detection of malicious software functionality
    Jensen, Jostein
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 292 - +
  • [5] Advanced malicious beaconing detection through AI
    Borchani Y.
    1600, Elsevier Ltd (2020): : 8 - 14
  • [6] Malicious Software Detection utilizing Temporal-Graphs
    Mpanti, Anna
    Nikolopoulos, Stavros D.
    Polenakis, Iosif
    COMPUTER SYSTEMS AND TECHNOLOGIES, 2019, : 49 - 55
  • [7] A Differential Coefficient Inspired Method for Malicious Software Detection
    Liang Yiwen
    Yang He
    Li Tao
    Liu Changdong
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 130 - 133
  • [8] Androanalyzer: Android Malicious Software Detection Based on Deep Learning
    Arslan R.S.
    PeerJ Computer Science, 2021, 7 : 1 - 20
  • [9] AndroAnalyzer: android malicious software detection based on deep learning
    Arslan, Recep Sinan
    PEERJ COMPUTER SCIENCE, 2021,
  • [10] MalDC: Malicious Software Detection and Classification using Machine Learning
    Moon, Jaewoong
    Kim, Subin
    Jangyong, Park
    Lee, Jieun
    Kim, Kyungshin
    Song, Jaeseung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (05): : 1466 - 1488