Metamorphic Virus: Analysis and Detection
نویسندگان
چکیده
Metamorphic viruses transform their code as they propagate, thus evading detection by static signature-based virus scanners, while keeping their functionality. They use code obfuscation techniques to challenge deeper static analysis and can also beat dynamic analyzers, such as emulators, by altering their behavior. To achieve this, metamorphic viruses use several metamorphic transformations, including register renaming, code permutation, code expansion, code shrinking, and garbage code insertion. In this article, a simple analysis of metamorphic viruses is presented, along with the techniques they use to transform their code to new generations. This article describes the evolution of the computer virus from the first-generation simple virus to the most advanced metamorphic virus. Several metamorphic techniques are described, then the description of several techniques to detect metamorphic viruses is given. Metamorphic Virus: Analysis and Detection Royal Holloway series Metamorphic virus • METAMORPHIC VIRUSES • CODE MUTATIONS • METAMORPHIC DETECTION • HEURISTIC DETECTION 2 1 THE MALWARE MENACE The recent years have been very interesting, but at the same time very frustrating for the information security professional. As information technology is expanding and improving, so are its threats. Its adversaries evolved from the 15 year old “script kiddy” to the professional hacker employed by organized crime. A recent research in the UK showed that around 97% of businesses in the UK have internet connection and around 88% have broadband, thus the thread from malicious software has never been greater. The research reports that virus infection was the biggest single cause of respondents’ worst security incidents, accounting for roughly half of them. Two-fifths of these were described as having a serious business impact. The report also informs that virus infections tended to take more effort to resolve than other incidents, some of Evgenios Konstantinou Information Security Group, Royal Holloway, Egham, Surrey, U.K.
منابع مشابه
Classification of Metamorphic Virus Using N Gram Analysis
Recent research work shows that n-gram is widely used in metamorphic virus detection. Viruses generated from kits like NGVCK are detected effectively by n-gram approach. Our purpose is to examine various flavours of ngram approach in virus detection.
متن کاملMetamorphic Virus Variants Classification Using Opcode Frequency Histogram
In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely or partly different and contain dissimilar sequences of string, but their behavior and function remain unchanged. This obfuscation process allows ...
متن کاملMetamorphic Viruses Detection Technique Based on the the Modified Emulators
An article presents a new technique for metamorphic viruses detection using modified emulators, placed in the hosts of the network. Proposed technique provides the classification of the metamorphic virus in classes with the usage of the fuzzy logic. Technique makes it possible to detect the metamorphic viruses, which use obfuscation techniques. The results of experimental studies showed the eff...
متن کاملAnalysis and Detection of Metamorphic Computer Viruses
comparison between our approach and commercial virus scanners. I would also like to thank my friends and schoolmates for their technical and emotional support. I want to thank Yue Wang for performing the virus scanning, and Peter Hey for repairing my hard disk after it crashed at the most critical moment. Finally I want to thank my family for their understanding and support throughout my five y...
متن کاملAdvanced Metamorphic Techniques in Computer Viruses
Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR...
متن کامل