Polymorphic Malware Detection

被引:0
|
作者
Selamat, Nur Syuhada [1 ]
Ali, Fakariah Hani Mohd [1 ]
Abu Othman, Noor Ashitah [2 ]
机构
[1] Univ Technol MARA Malaysia, Fac Comp & Math Sci, Shah Alam, Selangor, Malaysia
[2] Univ Technol MARA Malaysia, Fac Comp & Math Sci, Jasin, Melaka, Malaysia
关键词
malicious software; polymorphic; code obfuscation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most regular method of detecting malware relies on signature-based detection. Polymorphic malware pose a serious threat to modern computing. The challenge faced with this type of malware is that there is difficult to Antivirus (AV) technology to detect them. This polymorphic malware can't be detected by AV scanners because of mutated code by itself. This mutated code generated by the polymorphic engine, or called as mutation engine to make this malware become more difficult to read. In this paper, researcher examined how to detect polymorphic malware from the list of samples file based on dropped files.
引用
收藏
页码:274 / 278
页数:5
相关论文
共 50 条
  • [21] Malware Detection with Malware Images using Deep Learning Techniques
    He, Ke
    Kim, Dong Seong
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 95 - 102
  • [22] Decentralised firewall for malware detection
    Raje, Saurabh
    Vaderia, Shyamal
    Wilson, Neil
    Panigrahi, Rudrakh
    2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL (ICAC3), 2017,
  • [23] Metamorphic Detection of Repackaged Malware
    Singh, Shirish
    Kaiser, Gail
    2021 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON METAMORPHIC TESTING (MET 2021), 2021, : 9 - 16
  • [24] A New Approach to Malware Detection
    Tang, Hongying
    Zhu, Bo
    Ren, Kui
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 229 - +
  • [25] Malware Detection by Token Counting
    Poonia, Ajeet Singh
    Singh, Shivraj
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1285 - 1288
  • [26] Deep Android Malware Detection
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Kang, BooJoong
    Yerima, Suleiman
    Miller, Paul
    Sezer, Sakir
    Safaei, Yeganeh
    Trickel, Erik
    Zhao, Ziming
    Doup, Adam
    Ahn, Gail Joon
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 301 - 308
  • [27] Malware Detection in Cloud Computing
    Hatem, Safaa Salam
    Wafy, Maged H.
    El-Khouly, Mahmoud M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (04) : 187 - 192
  • [28] Detection of Repackaged Android Malware
    Shahriar, Hossain
    Clincy, Victor
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 349 - 354
  • [29] An Advanced Algorithm for Malware Detection
    Khan, Gousia Hazra Anjun
    Dewangan, Kranti Kumar
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [30] Smart malware detection on Android
    Gheorghe, Laura
    Marin, Bogdan
    Gibson, Gary
    Mogosanu, Lucian
    Deaconescu, Razvan
    Voiculescu, Valentin-Gabriel
    Carabas, Mihai
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4254 - 4272