A Novel Framework for Metamorphic Malware Detection

被引:0
|
作者
Jha A.K. [1 ]
Vaish A. [1 ]
Patil S. [1 ]
机构
[1] Indian Institute of Information Technology Allahabad, Prayagraj
关键词
Code obfuscation; Metamorphic malwares; Semantic preservation transformation;
D O I
10.1007/s42979-022-01433-1
中图分类号
学科分类号
摘要
Malwares are a major threat in the evolving global cyberspace. The different techniques for anti-virus software, in which presently there is insufficiency in detecting metamorphic malwares as they can change their internal structure of the code, keeping the flow of the program equivalent to the virus. Commercial Antivirus software depends on signature detection algorithms to identify viruses, but code obfuscation techniques can circumvent the above algorithms successfully. The objective of this research is to analyze the different detection techniques of such metamorphic malware. We also propose a novel methodology of detecting them via use of different machine learning algorithms, such as KNN, Support Vector Machine (SVM), RF (random forest), and naive Bayes. We also establish multiple semantic preserving transformation techniques for code obfuscation. Analysis regarding the same has been presented too. © 2022, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [31] Malware-Aware Processors: A Framework for Efficient Online Malware Detection
    Ozsoy, Meltem
    Donovick, Caleb
    Gorelik, Iakov
    Abu-Ghazaleh, Nael
    Ponomarev, Dmitry
    2015 IEEE 21ST INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2015, : 651 - 661
  • [32] Metamorphic malware detection using opcode frequency rate and decision tree
    Fazlali, Mahmood
    Khodamoradi, Peyman
    Mardukhi, Farhad
    Nosrati, Masoud
    Dehshibi, Mohammad Mahdi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (03) : 67 - 86
  • [33] Pruned Feature Space for Metamorphic Malware Detection using Markov Blanket
    Raphel, Jithu
    Vinod, P.
    2015 EIGHTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2015, : 377 - 382
  • [34] Detection of metamorphic and virtualization-based malware using algebraic specification
    Webster, Matt
    Malcolm, Grant
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (03): : 221 - 245
  • [35] Metamorphic Malware Detection Using Linear Discriminant Analysis and Graph Similarity
    Mirzazadeh, Reza
    Moattar, Mohammad Hossein
    Jahan, Majid Vafaei
    2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2015, : 61 - 66
  • [36] A novel deep framework for dynamic malware detection based on API sequence intrinsic features
    Li, Ce
    Lv, Qiujian
    Li, Ning
    Wang, Yan
    Sun, Degang
    Qiao, Yuanyuan
    COMPUTERS & SECURITY, 2022, 116
  • [37] TSDroid: A Novel Android Malware Detection Framework Based on Temporal & Spatial Metrics in IoMT
    Zhang, Gaofeng
    Li, Yu
    Bao, Xudan
    Chakarborty, Chinmay
    Rodrigues, Joel J. P. C.
    Zheng, Liping
    Zhang, Xuyun
    Qi, Lianyong
    Khosravi, Mohammad R.
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (03)
  • [38] The design space of metamorphic malware
    Walenstein, Andrew
    Mathur, Rachit
    Chouchane, Mohamed
    Lakhotia, Arun
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 241 - +
  • [39] Permission Extraction Framework for Android Malware Detection
    Ghasempour A.
    Sani N.F.M.
    Abari O.J.
    International Journal of Advanced Computer Science and Applications, 2020, 11 (11): : 463 - 475
  • [40] Permission Extraction Framework for Android Malware Detection
    Ghasempour, Ali
    Sani, Nor Fazlida Mohd
    Abari, Ovye John
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (11) : 463 - 475