Evaluation of Malware Phylogeny Modelling Systems Using Automat

نویسندگان

  • Matthew Hayes
  • Andrew Walenstein
  • Arun Lakhotia
چکیده

A malware phylogeny model is an estimation of the derivation relationships between a set of species of malware. Systems that construct phylogeny models are expected to be useful for malware analysts. While several different phylogeny construction systems have been proposed, little is known about effective ways of evaluating and comparing them. Little is also known about the consistency of their results on different data sets, about their generalizability across different types of malware evolution, or of what measures are important to consider in evaluation. This paper explores these issues through two distinct artificial malware history generators. A study was conducted using two phylogeny model construction systems. The results underscore the important role that model-based simulation is expected to play in evaluating and selecting suitable malware phylogeny construction systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Modelling and Compensation of uncertain time-delays in networked control systems with plant uncertainty using an Improved RMPC Method

Control systems with digital communication between sensors, controllers and actuators are called as Networked Control Systems (NCSs). In general, NCSs encounter with some problems such as packet dropouts and network induced delays. When plant uncertainty is added to the aforementioned problems, the design of the robust controller that is able to guarantee the stability, becomes more complex. In...

متن کامل

Modelling and Analysing Socio-Technical Systems

Modern organisations are complex, socio-technical systems consisting of a mixture of physical infrastructure, human actors, policies and processes. An increasing number of attacks on these organisations exploits vulnerabilities on all different levels, for example combining a malware attack with social engineering. Due to this combination of attack steps on technical and social levels, risk ass...

متن کامل

The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures

The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). Malware modelling has focused primarily on semantics due to the intended actions and behaviours of viral and worm code. The aim of this pape...

متن کامل

EICAR 2005 Conference: Best Paper Proceedings

Construction of malware phylogeny could help in analyzing new malware samples as they arrive. However, the generated phylogenies must be accurate and be able to contend with the changes and obfuscations the malware writers create in the codes. We present our approach of using maximal πpattern, a PQ tree based feature, as a basis for comparing and classifying malwares. We argue that the πpattern...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008