CHI-SQUARED DISTANCE AND METAMORPHIC VIRUS DETECTION A Thesis
نویسنده
چکیده
CHI-SQUARED DISTANCE AND METAMORPHIC VIRUS DETECTION by Annie H. Toderici Malware are programs that are designed with a malicious intent. Metamorphic malware change their internal structure each generation while still maintaining their original behavior. As metamorphic malware become more sophisticated, it is important to develop efficient and accurate detection techniques. Current commercial antivirus software generally try to scan for malware signatures within files and match them against a known set of signatures; therefore, they are not able to detect metamorphic malware that change their body from generation to generation, with each copy comprised of its own unique signature. Machine learning methods such as hidden Markov models (HMM) have shown promising results in detecting metamorphic malware. However, it is possible to exploit a weakness in HMMs and avoid detection by morphing and merging the malware with contents from normal files. As an alternative approach, we consider combining HMMs with the statistical framework of the chi-squared test to build a new detection method. This paper will present the experimental results of our proposed hybrid detector in metamorphic malware detection.
منابع مشابه
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely or partly different and contain dissimilar sequences of string, but their behavior and function remain unchanged. This obfuscation process allows ...
متن کاملUnknown Metamorphic Malware Detection: Modelling with Fewer Relevant Features and Robust Feature Selection Techniques
Detection of metamorphic malware is a challenging problem as a result of high diversity in the internal code structure between generations. Code morphing/obfuscation when applied, reshapes malware code without compromising the maliciousness. As a result, signature based scanners fail to detect metamorphic malware. Prior research in the domain of metamorphic malware detection utilizes similarity...
متن کاملHardware Solutions for High Data Rate Modems
The exponentially-growing mobile data traffic imposes significant demands on the capacity of the mobile network. Fiber optic and microwave links are two main solutions for the mobile backhaul network, which provides connectivity between radio base station (RBS) sites and the switch sites. As compared to fiber, a microwave solution is much easier to deploy, however, its capacity is lower. This t...
متن کاملDBOD-DS: Distance Based Outlier Detection for Data Streams
Data stream is a newly emerging data model for applications like environment monitoring, Web click stream, network traffic monitoring, etc. It consists of an infinite sequence of data points accompanied with timestamp coming from external data source. Typically data sources are located onsite and very vulnerable to external attacks and natural calamities, thus outliers are very common in the da...
متن کاملEnhancing the detection of metamorphic malware using call graphs
Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. API call graph techniques follow two main steps, namely, transformation of malware samples into an API call graph using API call graph constructio...
متن کامل