Animesh Kumar Jha, Abhishek Vaish, Simona Sternad Zabukovšek, S. Bobek
{"title":"A Comparative Study of Metamorphic Malware Detection Techniques","authors":"Animesh Kumar Jha, Abhishek Vaish, Simona Sternad Zabukovšek, S. Bobek","doi":"10.18690/um.epf.5.2022.4","DOIUrl":null,"url":null,"abstract":"Malware is a major threat in the evolving global cyber space. The different detection techniques that currently exist are insufficient at detecting metamorphic malware, as they can change the internal structure of their code, thus keeping the flow of the programme equivalent to the virus. Commercial antivirus software depends on signature detection algorithms to identify viruses, however, code obfuscation techniques can successfully circumvent these algorithms. The objective of this research is to analyse the various detection techniques of such metamorphic malware used over the years and to unearth the strengths, weaknesses and advance research directions possible in the field of the detection of metamorphic malware.","PeriodicalId":217320,"journal":{"name":"6th FEB International Scientific Conference 2022","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"6th FEB International Scientific Conference 2022","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18690/um.epf.5.2022.4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Malware is a major threat in the evolving global cyber space. The different detection techniques that currently exist are insufficient at detecting metamorphic malware, as they can change the internal structure of their code, thus keeping the flow of the programme equivalent to the virus. Commercial antivirus software depends on signature detection algorithms to identify viruses, however, code obfuscation techniques can successfully circumvent these algorithms. The objective of this research is to analyse the various detection techniques of such metamorphic malware used over the years and to unearth the strengths, weaknesses and advance research directions possible in the field of the detection of metamorphic malware.