CHI-SQUARED DISTANCE AND METAMORPHIC VIRUS DETECTION A Thesis

نویسنده

  • Annie H. Toderici
چکیده

CHI-SQUARED DISTANCE AND METAMORPHIC VIRUS DETECTION by Annie H. Toderici Malware are programs that are designed with a malicious intent. Metamorphic malware change their internal structure each generation while still maintaining their original behavior. As metamorphic malware become more sophisticated, it is important to develop efficient and accurate detection techniques. Current commercial antivirus software generally try to scan for malware signatures within files and match them against a known set of signatures; therefore, they are not able to detect metamorphic malware that change their body from generation to generation, with each copy comprised of its own unique signature. Machine learning methods such as hidden Markov models (HMM) have shown promising results in detecting metamorphic malware. However, it is possible to exploit a weakness in HMMs and avoid detection by morphing and merging the malware with contents from normal files. As an alternative approach, we consider combining HMMs with the statistical framework of the chi-squared test to build a new detection method. This paper will present the experimental results of our proposed hybrid detector in metamorphic malware detection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Metamorphic Virus Variants Classification Using Opcode Frequency Histogram

In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely or partly different and contain dissimilar sequences of string, but their behavior and function remain unchanged. This obfuscation process allows ...

متن کامل

Unknown Metamorphic Malware Detection: Modelling with Fewer Relevant Features and Robust Feature Selection Techniques

Detection of metamorphic malware is a challenging problem as a result of high diversity in the internal code structure between generations. Code morphing/obfuscation when applied, reshapes malware code without compromising the maliciousness. As a result, signature based scanners fail to detect metamorphic malware. Prior research in the domain of metamorphic malware detection utilizes similarity...

متن کامل

Hardware Solutions for High Data Rate Modems

The exponentially-growing mobile data traffic imposes significant demands on the capacity of the mobile network. Fiber optic and microwave links are two main solutions for the mobile backhaul network, which provides connectivity between radio base station (RBS) sites and the switch sites. As compared to fiber, a microwave solution is much easier to deploy, however, its capacity is lower. This t...

متن کامل

DBOD-DS: Distance Based Outlier Detection for Data Streams

Data stream is a newly emerging data model for applications like environment monitoring, Web click stream, network traffic monitoring, etc. It consists of an infinite sequence of data points accompanied with timestamp coming from external data source. Typically data sources are located onsite and very vulnerable to external attacks and natural calamities, thus outliers are very common in the da...

متن کامل

Enhancing the detection of metamorphic malware using call graphs

Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. API call graph techniques follow two main steps, namely, transformation of malware samples into an API call graph using API call graph constructio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012