Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence

被引:1
|
作者
Thanh Nguyen Vu [1 ]
Toan Tan Nguyen [1 ]
Hieu Phan Trung [1 ]
Thao Do Duy [1 ]
Ke Hoang Van [1 ]
Tuan Dinh Le [2 ]
机构
[1] Vietnam Natl Univ, Univ Informat Technol, Ho Chi Minh City, Vietnam
[2] Long An Univ Econ & Ind, Tan An, Long An Provinc, Vietnam
来源
关键词
Malware detection; Data mining; Longest common sequence; Neural network; MALICIOUS EXECUTABLES;
D O I
10.1007/978-3-319-70004-5_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Metamorphic malware detection is one of the most challenging tasks of antivirus software because of the difference in signatures of new variants from preceding one [1]. This paper proposes the method for the metamorphic malware detection by Portable Executable (PE) Analysis with the Longest Common Sequence (LCS). The proposed method contains the following phase: The raw feature extraction obtains valuable features like the information of Windows PE files which are PE header information, dependencies imports and API call functions, the code segments inside each of Windows PE file. Next, these segments are used for generating the detectors, which are later used to determine affinities with code segments of executable files by the longest common sequence algorithm. Finally, header, imports, API call information and affinities are combine into vectors as input for classifiers are used for classification after a dimensionality reduction. The experimental results showed that the proposed method can achieve up to 87.1% precision, 63.3% recall for benign and 92.6% precision, 93.7% for average malware.
引用
收藏
页码:262 / 272
页数:11
相关论文
共 50 条
  • [1] Metamorphic Detection of Repackaged Malware
    Singh, Shirish
    Kaiser, Gail
    [J]. 2021 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON METAMORPHIC TESTING (MET 2021), 2021, : 9 - 16
  • [2] A framework for metamorphic malware analysis and real-time detection
    Alam, Shahid
    Horspool, R. Nigel
    Traore, Issa
    Sogukpinar, Ibrahim
    [J]. COMPUTERS & SECURITY, 2015, 48 : 212 - 233
  • [3] Ranked Linear Discriminant Analysis Features for Metamorphic Malware Detection
    Kuriakose, Jikku
    Vinod, P.
    [J]. SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 112 - 117
  • [4] Classification and Detection of Metamorphic Malware using Value Set Analysis
    Leder, Felix
    Steinbock, Bastian
    Martini, Peter
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 39 - 46
  • [5] DaCoMM: Detection and Classification of Metamorphic Malware
    Mehra, Vishakha
    Jain, Vinesh
    Uppal, Dolly
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 668 - 673
  • [6] A Novel Framework for Metamorphic Malware Detection
    Jha A.K.
    Vaish A.
    Patil S.
    [J]. SN Computer Science, 4 (1)
  • [7] Frequency Based Metamorphic Malware Detection
    Carkaci, Necmettin
    Sogukpmar, Ibrahim
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 421 - 424
  • [8] Discriminant Features for Metamorphic Malware Detection
    Kuriakose, Jikku
    Vinod, P.
    [J]. 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 406 - 411
  • [9] Metamorphic malware detection using base malware identification approach
    Mahawer, Devendra Kumar
    Nagaraju, A.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1719 - 1733
  • [10] Metamorphic Malware Detection Using Linear Discriminant Analysis and Graph Similarity
    Mirzazadeh, Reza
    Moattar, Mohammad Hossein
    Jahan, Majid Vafaei
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2015, : 61 - 66