CFP last date
20 May 2024
Reseach Article

A Novel Approach for Predicting the Malware Attacks

by Ekta Rokkathapa, Soumen Kanrar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 45
Year of Publication: 2019
Authors: Ekta Rokkathapa, Soumen Kanrar
10.5120/ijca2019918585

Ekta Rokkathapa, Soumen Kanrar . A Novel Approach for Predicting the Malware Attacks. International Journal of Computer Applications. 181, 45 ( Mar 2019), 30-32. DOI=10.5120/ijca2019918585

@article{ 10.5120/ijca2019918585,
author = { Ekta Rokkathapa, Soumen Kanrar },
title = { A Novel Approach for Predicting the Malware Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2019 },
volume = { 181 },
number = { 45 },
month = { Mar },
year = { 2019 },
issn = { 0975-8887 },
pages = { 30-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number45/30423-2019918585/ },
doi = { 10.5120/ijca2019918585 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:12.141769+05:30
%A Ekta Rokkathapa
%A Soumen Kanrar
%T A Novel Approach for Predicting the Malware Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 45
%P 30-32
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Malware means malicious software. Detecting malware over a system is malware analysis. It consists of two parts static analysis and dynamic analysis. Static analysis includes analyzing a suspicious file and dynamic analysis means observing a file during its process time. In this paper, we have proposed a framework for malware analysis based on semi automated malware detection usually machine learning which is based on dynamic malware detection . The framework shows the quality of experience (QoE) to maintain the efficiency tradeoffs and uses the method of classification. The samples of malware also shows that the framework create a strong detection method.

References
  1. Sikorski, Michael, and Andrew Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, 2015.
  2. Egele, Manuel, et al. “A survey on automated dynamic malware-analysis techniques and tools.” ACM Computing Surveys (CSUR) 44.2 (2016): 6.
  3. R. Perdisci, A. Lanzi, and W. Lee, “McBoost: Boosting Scalability in Malware Collection and Analysis using Statistical Classification of Executables,” 2011, pp. 301–310.
  4. S. M. Tabish, M. Z. Shafiq, and M. Farooq, “Malware Detection using Statistical Analysis of Byte-Level File Content,” CSI-KDD ’09 Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, pp. 23–31, 2009.
  5. D. Wagner and P. Soto, “Mimicry Attacks on Host-Based Intrusion Detection Systems,” Proceedings of the 9th ACM
  6. Conference on Computer and CommunicationsSecurity, pp. 255–264, 2002.
  7. A. Walenstein and M. Venable, “Exploiting Similarity Between Variants to Defeat Malware,” Proceedings of BlackHat Briefings DC 2007, pp. 1–12, 2007.
  8. A. Karnik, S. Goswami, and R. Guha, “Detecting Obfuscated Viruses Using Cosine Similarity Analysis,” First Asia International Conference on Modelling & Simulation (AMS’07), pp. 165–170, 2007.
  9. M. Gheorghescu, “An Automated Virus Classification System,” Virus Bulletin Conference, pp. 294–300, 2005.
  10. C. LeDoux and A. Lakhotia, “Malware and machine learning,” in Intelligent Methods for Cyber Warfare, 2015.
  11. X. Hu, T. Chiueh, and K. G. Shin, “Large-scale Malware Indexing Using Function-Call Graphs,” Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009.
  12. D. Maiorca and G. Giacinto, “Looking at the Bag is not Enough to Find the Bomb : An Evasion of Structural Methods for Malicious PDF Files Detection,”
  13. Proceedings of the ASIA CCS’13, pp. 119–129, 2013.N. Srndic and P. Laskov, “Practical Evasion of A Learning-based Classifier: A case study,” Proceedings - IEEE Symposium on Security and Privacy, pp. 197–211, 2014.
  14. W. Xu, Y. Qi, and D. Evans, “Automatically evading classifiers: A case study on pdf malware classifiers,” NDSS, 2016.
  15. K. Rieck, P. Trinius, C. Willems, and T. Holz, “Automatic Analysis of Malware Behavior using Machine Learning,” pp. 1–30, 2011.
  16. U. Bayer, “Large-Scale Dynamic Malware Analysis,” PhD Thesis, pp. 1–109, 2009.
  17. U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, “Scalable , Behavior-Based Malware Clustering,” NDSS, pp. 51–88, 2009.
  18. Google Safe Browsing, “Google Safe Browsing.”
  19. [Online]. Available: https: //safebrowsing.google.com/
  20. W. Xu, Y. Qi, and D. Evans, “Automatically evading classifiers: A case study on pdf malware classifiers,” NDSS, 2016.
  21. U. Bayer, “Large-Scale Dynamic Malware
  22. Analysis,” PhD Thesis, pp. 1–109, 2009.
  23. 22. U. Bayer, P. M. Comparetti, C.Hlauschek, C.Kruegel, and E. Kirda, “Scalable , Behavior- Based Malware Clustering,” NDSS, pp. 51–88, 2009.
  24. P. Trinius, C. Willems, T. Holz, and K.Rieck, “A Malware Instruction Set for Behavior-Based Analysis,” Sicherheit Schutz undZuverl¨assigkeit SICHERHEIT, pp. 1–11, 2011.
  25. “Malware Information Sharing Platform,”
  26. http://www.misp-project.org/, 2016, [Online; accessed March, 2016].
  27. “Information Sharing Specifications for Cybersecurity,” https://www.us-cert. gov/Information-Sharing-specifications Cybersecurity, 2016, [Online; accessed March, 2016].
Index Terms

Computer Science
Information Sciences

Keywords

Malware attacks disassembler evasion attacks machine learning