A Novel Framework for Metamorphic Malware Detection

被引:0
|
作者
Jha A.K. [1 ]
Vaish A. [1 ]
Patil S. [1 ]
机构
[1] Indian Institute of Information Technology Allahabad, Prayagraj
关键词
Code obfuscation; Metamorphic malwares; Semantic preservation transformation;
D O I
10.1007/s42979-022-01433-1
中图分类号
学科分类号
摘要
Malwares are a major threat in the evolving global cyberspace. The different techniques for anti-virus software, in which presently there is insufficiency in detecting metamorphic malwares as they can change their internal structure of the code, keeping the flow of the program equivalent to the virus. Commercial Antivirus software depends on signature detection algorithms to identify viruses, but code obfuscation techniques can circumvent the above algorithms successfully. The objective of this research is to analyze the different detection techniques of such metamorphic malware. We also propose a novel methodology of detecting them via use of different machine learning algorithms, such as KNN, Support Vector Machine (SVM), RF (random forest), and naive Bayes. We also establish multiple semantic preserving transformation techniques for code obfuscation. Analysis regarding the same has been presented too. © 2022, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [41] Robotdroid: A lightweight malware detection framework on smartphones
    Zhao, Min
    Zhang, Tao
    Ge, Fangbin
    Yuan, Zhijian
    Journal of Networks, 2012, 7 (04) : 715 - 722
  • [42] MetaAware: Identifying metamorphic malware
    Zhang, Qinghua
    Reeves, Douglas S.
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 411 - 420
  • [43] MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
    Gu, Wei
    Xing, Hongyan
    Hou, Tianhao
    IET INFORMATION SECURITY, 2024, 2024
  • [44] Automatic Benchmark Generation Framework for Malware Detection
    Liang, Guanghui
    Pang, Jianmin
    Shan, Zheng
    Yang, Runqing
    Chen, Yihang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [45] Structural entropy and metamorphic malware
    Baysa, Donabelle
    Low, Richard M.
    Stamp, Mark
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (04): : 179 - 192
  • [46] Boolean Signatures for Metamorphic Malware
    Ranjan, Aditya Kaushal
    Ali, Raja
    Kumar, Vijay
    Hosseinzadeh, Minoo
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 255 - 262
  • [47] An Adaptive Framework for Classification and Detection of Android Malware
    Al Sharah, Ashraf
    Alrub, Yousef Abu
    Owida, Hamza Abu
    Elsoud, Esraa Abu
    Alshdaifat, Nawaf
    Khtatnaha, Hamzah
    International Journal of Interactive Mobile Technologies, 2024, 18 (21) : 59 - 73
  • [48] A malware detection framework based on kolmogorov complexity
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
    J. Comput. Inf. Syst., 8 (2687-2694):
  • [49] A novel approach for early malware detection
    Sharma, Anshul
    Singh, Sanjay Kumar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (02)
  • [50] Detection of Global, Metamorphic Malware Variants Using Control and Data Flow Analysis
    Agrawal, Hira
    Bahler, Lisa
    Micallef, Josephine
    Snyder, Shane
    Virodov, Alexandr
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,