Idea: Opcode-Sequence-Based Malware Detection

被引:0
|
作者
Santos, Igor [1 ]
Brezo, Felix [1 ]
Nieves, Javier [1 ]
Penya, Yoseba K. [2 ]
Sanz, Borja [1 ]
Laorden, Carlos [1 ]
Bringas, Pablo G. [1 ]
机构
[1] Univ Deusto, S3Lab, Bilbao, Spain
[2] Univ Deusto, Energy Lab, Bilbao, Spain
关键词
malware detection; computer security; machine learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. Hence, malware detection has become a critical topic in computer security. Currently, signature-based detection is the most extended method within commercial antivirus. Although this method is still used on most popular commercial computer antivirus software, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new variations of known malware. In this paper, we propose a new method to detect variants of known malware families. This method is based on the frequency of appearance of opcode sequences. Furthermore, we describe a method to mine the relevance of each opcode and, thereby, weigh each opcode sequence frequency. We show that this method provides an effective way to detect variants of known malware families.
引用
收藏
页码:35 / +
页数:3
相关论文
共 50 条
  • [31] Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware
    Canfora, Gerardo
    De Lorenzo, Andrea
    Medvet, Eric
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 333 - 340
  • [32] Opcode sequences as representation of executables for data-mining-based unknown malware detection
    Santos, Igor
    Brezo, Felix
    Ugarte-Pedrero, Xabier
    Bringas, Pablo G.
    INFORMATION SCIENCES, 2013, 231 : 64 - 82
  • [33] Deep learning-aided runtime opcode-based Windows malware detection
    Enes Sinan Parildi
    Dimitrios Hatzinakos
    Yuri Lawryshyn
    Neural Computing and Applications, 2021, 33 : 11963 - 11983
  • [34] Deep learning-aided runtime opcode-based Windows malware detection
    Parildi, Enes Sinan
    Hatzinakos, Dimitrios
    Lawryshyn, Yuri
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (18): : 11963 - 11983
  • [35] Multichannel Based IoT Malware Detection System Using System Calls and Opcode Sequences
    Manoharan, Shobana
    Sugumaran, Poonkuzhali
    Kumar, Kishore
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2022, 19 (02) : 261 - 271
  • [36] Analysis and Comparison of Disassemblers for OpCode Based Malware Analysis
    Nar, Mert
    Kakisim, Arzu Gorgulu
    Yavuz, Melek Nurten
    Sogukpinar, Ibrahim
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 17 - 22
  • [37] A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm
    Wang, Cheng
    Qin, Zheng
    Zhang, Jixin
    Yin, Hui
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 481 - 487
  • [38] MalOSDF: An Opcode Slice-Based Malware Detection Framework Using Active and Ensemble Learning
    Guo, Wenjie
    Xue, Jingfeng
    Meng, Wenheng
    Han, Weijie
    Liu, Zishu
    Wang, Yong
    Li, Zhongjun
    ELECTRONICS, 2024, 13 (02)
  • [39] Android malware obfuscation variants detection method based on multi-granularity opcode features
    Tang, Junwei
    Li, Ruixuan
    Jiang, Yu
    Gu, Xiwu
    Li, Yuhua
    Future Generation Computer Systems, 2022, 129 : 141 - 151
  • [40] Android malware obfuscation variants detection method based on multi-granularity opcode features
    Tang, Junwei
    Li, Ruixuan
    Jiang, Yu
    Gu, Xiwu
    Li, Yuhua
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 129 : 141 - 151