Mert Nar, A. Kakisim, Necmettin Çarkaci, Melek Nurten Yavuz, I. Sogukpinar
{"title":"Analysis and Comparison of Opcode-based Malware Detection Approaches","authors":"Mert Nar, A. Kakisim, Necmettin Çarkaci, Melek Nurten Yavuz, I. Sogukpinar","doi":"10.1109/UBMK.2018.8566292","DOIUrl":null,"url":null,"abstract":"Malicious software (Malwares) become major threats for digital assets in the digital environment. Traditional malware detection systems use the signatures of the malware executables to detect them. However, the complexity and diversity of malwares increases day by day with metamorphic ones that quickly change its structure and signature. Therefore, most of the researches have focused on the detection of these kinds of malwares. In this work, five different malware detection approaches have been implemented and tested on real and synthetic malware and benign samples. We have collected a new malware data set including 6857 benign and 8701 malicious samples. Experiments have shown that the real malware executables decrease the performance of the methods.","PeriodicalId":293249,"journal":{"name":"2018 3rd International Conference on Computer Science and Engineering (UBMK)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 3rd International Conference on Computer Science and Engineering (UBMK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UBMK.2018.8566292","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Malicious software (Malwares) become major threats for digital assets in the digital environment. Traditional malware detection systems use the signatures of the malware executables to detect them. However, the complexity and diversity of malwares increases day by day with metamorphic ones that quickly change its structure and signature. Therefore, most of the researches have focused on the detection of these kinds of malwares. In this work, five different malware detection approaches have been implemented and tested on real and synthetic malware and benign samples. We have collected a new malware data set including 6857 benign and 8701 malicious samples. Experiments have shown that the real malware executables decrease the performance of the methods.