CFP last date
20 May 2024
Reseach Article

Analysis and Detection of Evolutionary Malware: A Review

by Pushpendra Dwivedi, Hariom Sharan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 20
Year of Publication: 2021
Authors: Pushpendra Dwivedi, Hariom Sharan
10.5120/ijca2021921005

Pushpendra Dwivedi, Hariom Sharan . Analysis and Detection of Evolutionary Malware: A Review. International Journal of Computer Applications. 174, 20 ( Feb 2021), 42-45. DOI=10.5120/ijca2021921005

@article{ 10.5120/ijca2021921005,
author = { Pushpendra Dwivedi, Hariom Sharan },
title = { Analysis and Detection of Evolutionary Malware: A Review },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2021 },
volume = { 174 },
number = { 20 },
month = { Feb },
year = { 2021 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number20/31808-2021921005/ },
doi = { 10.5120/ijca2021921005 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:41.359195+05:30
%A Pushpendra Dwivedi
%A Hariom Sharan
%T Analysis and Detection of Evolutionary Malware: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 20
%P 42-45
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Malwares now a days has become a big threat to the digital world around the globe. It target the network, system and penetrate into it, get access to the computers, brings down the servers, steal confidential information, ask for ransom, harm the critical infrastructure etc. to deal with the threats from these malwares and attack many anti- malwares have been developed so far. Some of them are based on the assumption that malwares do not change their structure. But with the with the advancements second generation malwares can create their variants that’s why they are hard to detect. We present our survey on evolutionary malware and its detection techniques.

References
  1. Symantec Corporation. 2012 Symantec Internet Security Threat Report, Symantec
  2. Rad, B., Masrom, M. and Ibrahim, S. “Camouflage in Malware: From Encryption to Metamorphism”, International Journal of Computer Science and Network Security, 2012, 12: 74-83.
  3. Beaucamps, P. “Advanced polymorphic techniques International Journal of Computer Science”, 2001, 25: 400411.
  4. Rad, B. B., Masrom, M. and Ibrahim, S. “Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey, International Journal of Computer Science Issues, 2011, 8:113121.
  5. Shah, A. Approximate Disassembly using Dynamic Programming [PhD. Thesis], San Jose State University, US, 2010.
  6. B. Anderson and D. McGrew. Identifying Encrypted Malware traffic with Contextual Flow Data. In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, AISec ’16, pages 35-46, 2016.
  7. Cho, Y. and Mangione-Smith, W. High-performance context-free parser for polymorphic malware detection, United States Patent US 2006113722, 2009 April 18.
  8. Austin, T. H., Filiol, E., Josse, and Stamp, S. M. “Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach, Proceedings of the 46th Hawaii International Conference on System Sciences, Wailea, HI, USA, 2013, Jan 7-10, 50395048.
  9. Ferrie, P., Corporation, S. and Monica, S . “HUNTING FOR METAMORPHIC”, Proceedings of the Virus Bulletin Conference 2001, Czech Republic, Prague, 2001 Sep 27-28, 123144.
  10. Ddcreateur, ANTIVIRUS 2004, [Database on the Internet]. Codes-sources library. [updated 2004 March 26; cited 2013 Oct 1]. Available from http://files.Codessources.com/fichierfullscreen.aspx?id=21418&f=virus signatures.txt⟨=en
  11. Tran, N. and Lee, M. “High performance string matching for security applications”, Proceedings of the International Conference on ICT for Smart Society, Jakarta 2013 June 13-14, 15. 11
  12. Mathur, K. and Hiranwai, S. “A Survey on Techniques in Detection and Analyzing Malware Executables”. International Journal of Advanced Research in Computer Science and Software Engineering, 2013, 3: 422428.
  13. E. Konstantinou, “Metamorphic virus: Analysis and detection,” 2008, Technical Report RHUL-MA-2008-2, Search Security Award M.Sc.thesis, 93 pages
  14. Harley, D. and Lee, A. “Heuristic AnalysisDetecting Unknown Viruses”, [White paper] Eset, 2007, [cited 2013 Oct 1]. Available from http://www.eset.Com /us/resources/white-papers/Heu- ristic Analysis.pdf
  15. Wong, W. and Stamp, M. “Hunting for metamorphic engines”, Journal in Computer Virology, 2006, 2: 211229.
  16. Mitchell, T. M. “Machine learning”, Burr Ridge, IL: McGraw Hill, 1997.
  17. Moskovitch, R., Yuval, E. and Lior, R. “Detection of unknown computer worms based on behavioral classification of the host”, Computational Statistics & Data Analysis, 2008, 52: 4544-4566.
  18. Alazab, M. and Venkatraman, S. “Zero-day malware detection based on supervised learning algorithms of api call signatures”, Proceedings of the Ninth Australasian Data Mining Conference, Ballarat, Australia 2011 Nov, 121: 171182.
  19. Moskovitch, R., Elovici, Y. and Rokach, L. “Detection of unknown computer worms based on behavioral classification of the host, Computational Statistics & Data Analysis, 2008, 52:45444566.
  20. Siddiqui, M., Wang, M. C. and Lee, J. “A survey of data mining techniques for malware detection using file features, Proceedings of the 46th Annual Southeast Regional Conference, New York, USA, 2008, March 28-28, 509-510.
  21. J. Z. Kolter and M. A. Maloof, “Learning to detect and classify malicious executables in the wild,” Journal of Machine Learning Research, vol. 7, pp. 2721–2744, December 2006, special Issue on Machine Learning in Computer Security.
  22. M. R. Chouchane, A. Walenstein, and A. Lakhotia, “Using Markov Chains to filter machine-morphed variants of malicious programs,” in Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on, 2008, pp. 77–84
  23. Y. Ye, D. Wang, T. Li, and D. Ye, “Imds: intelligent malware detection system,” in KDD, P. Berkhin, R. Caruana, and X. Wu, Eds. ACM, 2007, pp. 1043–1047.
  24. Xu, M., Wu, L., Qi, S., Xu, J., Zhang, H., Ren, Y. and Zheng, N. “A similarity metric method of obfuscated malware using function-call graph”, Journal of Computer Virology and Hacking Techniques. 2013, 9:3547. 12
  25. Xu, J., Sung, A. H., Chavez, P. and Mukkamala, S. “Polymorphic malicious executable scanner by API sequence analysis”, Proceedings of the Fourth International Conference on Hybrid Intelli- gent Systems, Kitakyushu, Japan, 2004, Dec 5-8, 378-383.
  26. Christodorescu, M., Johannes, K., Jha, S., Katzenbeisser, S. and Veith, H. “Malware Normalization”, University of Wisconsin, Madison, Wisconsin, USA, 2005 November. Report No: 1539.
  27. Armoun, S. E. and Hashemi, S. “A General Paradigm for Normalizing Metamorphic Malwares, Proceedings of the 10th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, 2012, Dec 17-19, 348353.
  28. Yong Tang, Bin Xiao and Xicheng Lu, “Signature Tree Generation for Polymorphic Worms”, IEEE TRANSACTIONS ON COMPUTERS,VOL. 60, NO. 4, APRIL 201.
  29. You, I. and Yim, K. “Malware Obfuscation Techniques: A Brief Survey, Proceedings of IEEE International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, 2010, Nov 4-6, 297300.
Index Terms

Computer Science
Information Sciences

Keywords

Malwares Antimalware Oligomorphic Metamorphic Polymorphic