Approximate Detection of Machine - morphed Variants of Malicious Programs

نویسندگان

  • Mohamed Radhouane Chouchane
  • Andrew Walenstein
  • William R. Edwards
  • Anthony S. Maida
چکیده

A morphing malware is malicious software that uses a code morphing program, ormorphing engine, to transform its own code into a morphed variant. The goal ofthis transformation is to evade recognition by malware detectors. This dissertationproposes and evaluates a new method for detecting morphed malware variants. The method uses information about the morphing engine to recognize variants createdby that engine. In particular, it is shown that implementation of the requirementsof good design practices of morphing malware can be capitalized upon to efficientlydiscriminate programs generated by a morphing engine implementing theserequirements from programs that have not been generated by the engine. Exactrecognition techniques implementing this method are proposed and shown to becomputationally costly. Approximate efficient variations on these techniques arethen proposed and successfully evaluated to recognize programs generated by a realworld morphing engine, W32.Evol. Finally, the variation of a malware’s instructiondistribution underlying a probabilistic morphing engine is modeled as a Markovchain. Techniques from Markov chain theory are suggested to enable the use, fordetection purposes, of the distribution of the instruction-frequency vectors of the various generations of variants of morphed malware generated by a probabilisticmorphing engine.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Features for Metamorphic Malware Detection

Malware or malicious code intends to harm computer systems without the knowledge of system users. These malicious softwares are unknowingly installed by naive users while browsing the Internet. Once installed, the malware performs unintentional activities like (a) steal username, password; (b) install spy software to provide remote access to the attackers; (c) flood spam messages; (d) perform d...

متن کامل

Analyzing new features of infected web content in detection of malicious web pages

Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery...

متن کامل

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008