Malware detection: program run length against detection rate


Autoria(s): O'Kane, Philip; Sezer, Sakir; McLaughlin, Kieran; Gyu Im, Eul
Data(s)

01/02/2014

Resumo

N-gram analysis is an approach that investigates the structure of a program using bytes, characters or text strings. This research uses dynamic analysis to investigate malware detection using a classification approach based on N-gram analysis. A key issue with dynamic analysis is the length of time a program has to be run to ensure a correct classification. The motivation for this research is to find the optimum subset of operational codes (opcodes) that make the best indicators of malware and to determine how long a program has to be monitored to ensure an accurate support vector machine (SVM) classification of benign and malicious software. The experiments within this study represent programs as opcode density histograms gained through dynamic analysis for different program run periods. A SVM is used as the program classifier to determine the ability of different program run lengths to correctly determine the presence of malicious software. The findings show that malware can be detected with different program run lengths using a small number of opcodes

Identificador

http://pure.qub.ac.uk/portal/en/publications/malware-detection-program-run-length-against-detection-rate(5f553c7e-1161-439e-afad-c929cb7f4376).html

http://dx.doi.org/10.1049/iet-sen.2013.0020

Idioma(s)

eng

Direitos

info:eu-repo/semantics/closedAccess

Fonte

O'Kane , P , Sezer , S , McLaughlin , K & Gyu Im , E 2014 , ' Malware detection: program run length against detection rate ' IET Software , vol 8 , no. 1 , pp. 42-51 . DOI: 10.1049/iet-sen.2013.0020

Tipo

article