Polymorphic Malware Detection

被引:0
|
作者
Selamat, Nur Syuhada [1 ]
Ali, Fakariah Hani Mohd [1 ]
Abu Othman, Noor Ashitah [2 ]
机构
[1] Univ Technol MARA Malaysia, Fac Comp & Math Sci, Shah Alam, Selangor, Malaysia
[2] Univ Technol MARA Malaysia, Fac Comp & Math Sci, Jasin, Melaka, Malaysia
关键词
malicious software; polymorphic; code obfuscation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most regular method of detecting malware relies on signature-based detection. Polymorphic malware pose a serious threat to modern computing. The challenge faced with this type of malware is that there is difficult to Antivirus (AV) technology to detect them. This polymorphic malware can't be detected by AV scanners because of mutated code by itself. This mutated code generated by the polymorphic engine, or called as mutation engine to make this malware become more difficult to read. In this paper, researcher examined how to detect polymorphic malware from the list of samples file based on dropped files.
引用
收藏
页码:274 / 278
页数:5
相关论文
共 50 条
  • [1] Scalable Detection of Server-Side Polymorphic Malware
    Cohen, Yehonatan
    Hendler, Danny
    KNOWLEDGE-BASED SYSTEMS, 2018, 156 : 113 - 128
  • [2] Polymorphic Malware Detection Using Sequence Classification Methods
    Drew, Jake
    Moore, Tyler
    Hahsler, Michael
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 81 - 87
  • [4] An opcode-based technique for polymorphic Internet of Things malware detection
    Darabian, Hamid
    Dehghantanha, Ali
    Hashemi, Sattar
    Homayoun, Sajad
    Choo, Kim-Kwang Raymond
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (06):
  • [5] Polymorphic Malware Detection Using Topological Feature Extraction with Data Mining
    Fraley, James B.
    Figueroa, Marco
    SOUTHEASTCON 2016, 2016,
  • [6] MalHunter: Automatic generation of multiple behavioral signatures for polymorphic malware detection
    Razeghi Borojerdi, Haniye
    Abadi, Mahdi
    Proceedings of the 3rd International Conference on Computer and Knowledge Engineering, ICCKE 2013, 2013, : 430 - 436
  • [7] MalHunter: Automatic Generation of Multiple Behavioral Signatures for Polymorphic Malware Detection
    Borojerdi, Haniye Razeghi
    Abadi, Mahdi
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 430 - 436
  • [8] Deceiving AI-based malware detection through polymorphic attacks
    Catalano, C.
    Chezzi, A.
    Angelelli, M.
    Tommasi, F.
    COMPUTERS IN INDUSTRY, 2022, 143
  • [9] Clustering The Polymorphic Malware Traces
    Sarvani, A.
    Venugopal, B.
    Nagaraju, D.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [10] Polymorphic malware detection and identification via context-free grammar homomorphism
    Thompson, Gerald R.
    Flynn, Lori A.
    BELL LABS TECHNICAL JOURNAL, 2007, 12 (03) : 139 - 147