Kambiz Vahedi, M. Abbaspour, Khadijeh Afhamisisi, Mohammad Rashidnejad
{"title":"面向变形恶意软件检测的行为熵","authors":"Kambiz Vahedi, M. Abbaspour, Khadijeh Afhamisisi, Mohammad Rashidnejad","doi":"10.1109/ICCKE48569.2019.8964967","DOIUrl":null,"url":null,"abstract":"Recent metamorphic malware detection methods based on statistical analysis of malware code and measuring similarity between codes are by far more superior compared with signature-based detection methods; yet, lacking against code obfuscation methods including insertion of garbage codes similar to benign files and replacing instructions with equivalent instructions. This paper proposes a method on improved detection of metamorphic malwares based on activity and behavior analysis of executable files. The process involves two stages: initially, behavior of the file is analyzed during runtime and the behavioral pattern is obtained; then, in the second stage, behavioral patterns of the malware files are compared with the sample file in order to determine the level of similarity. The stage on analyzing behavior of the file is accomplished in a monitored environment and then malicious behavioral features of the file are extracted. The second stage involves determining level of similarity between malwares registered into the database in the first stage and the sample files. The obtained experimental results show that the proposed method, by determining the similarity level of behavioral patterns, significantly improves detection of metamorphic malwares and along with no false positives.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"22 1","pages":"78-84"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Behavioral Entropy Towards Detection of Metamorphic Malwares\",\"authors\":\"Kambiz Vahedi, M. Abbaspour, Khadijeh Afhamisisi, Mohammad Rashidnejad\",\"doi\":\"10.1109/ICCKE48569.2019.8964967\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent metamorphic malware detection methods based on statistical analysis of malware code and measuring similarity between codes are by far more superior compared with signature-based detection methods; yet, lacking against code obfuscation methods including insertion of garbage codes similar to benign files and replacing instructions with equivalent instructions. This paper proposes a method on improved detection of metamorphic malwares based on activity and behavior analysis of executable files. The process involves two stages: initially, behavior of the file is analyzed during runtime and the behavioral pattern is obtained; then, in the second stage, behavioral patterns of the malware files are compared with the sample file in order to determine the level of similarity. The stage on analyzing behavior of the file is accomplished in a monitored environment and then malicious behavioral features of the file are extracted. The second stage involves determining level of similarity between malwares registered into the database in the first stage and the sample files. The obtained experimental results show that the proposed method, by determining the similarity level of behavioral patterns, significantly improves detection of metamorphic malwares and along with no false positives.\",\"PeriodicalId\":6685,\"journal\":{\"name\":\"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)\",\"volume\":\"22 1\",\"pages\":\"78-84\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCKE48569.2019.8964967\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE48569.2019.8964967","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Behavioral Entropy Towards Detection of Metamorphic Malwares
Recent metamorphic malware detection methods based on statistical analysis of malware code and measuring similarity between codes are by far more superior compared with signature-based detection methods; yet, lacking against code obfuscation methods including insertion of garbage codes similar to benign files and replacing instructions with equivalent instructions. This paper proposes a method on improved detection of metamorphic malwares based on activity and behavior analysis of executable files. The process involves two stages: initially, behavior of the file is analyzed during runtime and the behavioral pattern is obtained; then, in the second stage, behavioral patterns of the malware files are compared with the sample file in order to determine the level of similarity. The stage on analyzing behavior of the file is accomplished in a monitored environment and then malicious behavioral features of the file are extracted. The second stage involves determining level of similarity between malwares registered into the database in the first stage and the sample files. The obtained experimental results show that the proposed method, by determining the similarity level of behavioral patterns, significantly improves detection of metamorphic malwares and along with no false positives.