Malicious Code Variant Detection : A Survey

Authors

  • K V Sreelakshmi  Department of Computer Science Engineering, Government Engineering College Idukki, Idukki, Kerala, India
  • Dileesh E D  Department of Computer Science Engineering, Government Engineering College Idukki, Idukki, Kerala, India

DOI:

https://doi.org//10.32628/IJSRSET207141

Keywords:

Malware Detection, Static Analysis, Dynamic Analysis.

Abstract

Malicious codes have become one of the major threats to computer systems. The malicious software which is also referred to as malware is designed by the attackers and can change their code as they propagate. The existing defense against malware is highly affected by the diversity and volume of malware variants that are being created rapidly. The variants of malware families exhibit typical behavioral patterns exhibiting their origin and purpose. The behavioral patterns can be exploited statically or dynamically to detect and classify malware into their known families. This paper provides a detailed survey of techniques to detect and classify malware into their respective families.

References

  1. Kancherla K., Mukkamala S., “Image visualization based malware detection”. In Proc. 2013 IEEE Symp. Computational Intelligence in Cyber Security, CICS, pp. 40–44, 2013.
  2. Y. Ye, D. Wang, T. Li, and D. Ye, “Imds: intelligent malware detection system,” in KDD, P. Berkhin, R. Caruana, and X. Wu, Eds., pp. 1043-1047,ACM 2007.
  3. A. Makandar and A. Patrot, “Detection and retrieval of malware using classification,” International Conference on Computing, Communication, Control and Automation (ICCUBEA), 2017.
  4. A. Makandar and A. Patrot, “Malware Class Recognition Using Image Processing Techniques,” International Conference on Data Management, Analytics and Innovation (ICDMAI) Zeal Society, Pune, India, Feb 24-26, 2017.
  5. Z. Zhao, “A virus detection scheme based on features of Control Flow Graph.” 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pages 943-947, 2011.
  6. L. Nataraj, S. Karthikeyan, G. Jacob, and B. Manjunath. “Malware images: visualization and automatic classification”. In Proceedings of the 8th international symposium on visualization for cyber security page 4. ACM, 2011.
  7. Cui, Z., Xue, F., Cai, X., Cao, Y., Wang, G., & Chen, J. (2018). “Detection of Malicious Code Variants Based on Deep Learning”. IEEE Transactions on Industrial Informatics, 14(7), 3187-3196, 2018.
  8. K. Han, J. H. Lim, and E. G. Im. “Malware analysis method using visualization of binary files”. In Proceedings of the 2013 Research in Adaptive and Convergent Systems, pages 317– 321. ACM, 2013.
  9. P. Trinius, T. Holz, J. G¨obel, and F. C. Freiling, “Visual analysis of malware behavior using treemaps and thread graphs”. In Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on, pages 33-38. IEEE, 2009.
  10. S.Tobiyama, Y. Yamaguchi, H. Shimada, T. Ikuse, and T. Yagi, “Malware detection with deep neuralnetwork using process behavior,” in Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual, vol. 2. IEEE, pp. 577–582, 2016.
  11. C. Fan, H.W. Hsiao, C.H. Chou and Y.F. Tseng, “Malware Detection System Based on API Log Data Mining”. IEEE 39th Annual International Computers, Software Applications Conference, 2015.
  12. Anderson, B., Quist, D., Neil, J., Storlie, C., & Lane, T. “Graph- based malware detection using dynamic analysis”. Journal in Computer Virology, 7(4), 247–258, 2011.
  13. Rieck, K., Trinius, P., Willems, C. and Holz, T. (2011) Automatic Analysis of Malware Behavior Using Machine Learning. Journal of Computer Security, 19, 639-668.
  14. Zolkipli, M.F. and Jantan, A. (2011) An Approach for Malware Behavior Identification and Classification. Proceeding of 3rd International Conference on Computer Research and Development, Shanghai, 11-13 March 2011, 191-194.
  15. Schultz, M., Eskin, E., Zadok, F. and Stolfo, S. (2001) “Data Mining Methods for Detection of New Malicious Executables”. Proceedings of 2001 IEEE Symposium on Security and Privacy, Oakland, 38-49, 2001.
  16. Choi, Y H et al. : “Towards extracting malware features for classification using dynamic and static analysis”. Computing and Networking Technology (ICCNT), Gueongju, South Korea, pp.126-129.
  17. Islam, R., Tian, R., Battenb, L. and Versteeg, S. (2013) Classification of Malware Based on Integrated Static and Dynamic Features. Journal of Network and Computer Application, 36, 646-556.
  18. Eskandari, M., Khorshidpour, Z., Hashemi, S.: HDM-Analyser: A hybrid analysis approach based on data mining techniques for malware detection. J. Comput. Virol. Hack. Techn. 9(2), 77–93 (2013).
  19. Santos, I., Devesa, J., Brezo, F., Nieves, J. and Bringas, P.G. (2013) OPEM: A Static-Dynamic Approach for Machine Learning Based Malware Detection. Proceedings of International Conference CISIS’12-ICEUTE’12,189,271-280.
  20. Anderson, B., Storlie, C. and Lane, T. (2012) Improving Malware Classification: Bridging the Static/Dynamic Gap. Proceedings of 5th ACM Workshop on Security and Artificial Intelligence (AISec), 3-14.

Downloads

Published

2020-02-29

Issue

Section

Research Articles

How to Cite

[1]
K V Sreelakshmi, Dileesh E D, " Malicious Code Variant Detection : A Survey, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 7, Issue 1, pp.245-251, January-February-2020. Available at doi : https://doi.org/10.32628/IJSRSET207141