A framework for metamorphic malware analysis and real-time detection

dc.contributor.authorAlam, Shahid
dc.contributor.authorHorspool, R. Nigel
dc.contributor.authorTraore, Issa
dc.contributor.authorSoğukpınar, İbrahim
dc.date.accessioned2025-10-29T11:29:30Z
dc.date.issued2015
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü
dc.description.abstractMetamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware writers change the obfuscations (syntax) more than the behavior (semantic) of such a new malware. On this assumption and motivation, this paper presents a new framework named MARD for Metamorphic Malware Analysis and Real-Time Detection. As part of the new framework, to build a behavioral signature and detect metamorphic malware in real-time, we propose two novel techniques, named ACFG (Annotated Control Flow Graph) and SWOD-CFWeight (Sliding Window of Difference and Control Flow Weight). Unlike other techniques, ACFG provides a faster matching of CFGs, without compromising detection accuracy; it can handle malware with smaller CFGs, and contains more information and hence provides more accuracy than a CFG. SWOD-CFWeight mitigates and addresses key issues in current techniques, related to the change of the frequencies of opcodes, such as the use of different compilers, compiler optimizations, operating systems and obfuscations. The size of SWOD can change, which gives. anti-malware tool developers the ability to select appropriate parameter values to further optimize malware detection. CFWeight captures the control flow semantics of a program to an extent that helps detect metamorphic malware in real-time. Experimental evaluation of the two proposed techniques, using an existing dataset, achieved detection rates in the range 94%-99.6%. Compared to ACFG, SWOD-CFWeight significantly improves the detection time, and is suitable to be used where the time for malware detection is more important as in real-time (practical) anti-malware applications. (C) 2014 Elsevier Ltd. All rights reserved.
dc.identifier.doi10.1016/j.cose.2014.10.011
dc.identifier.endpage233
dc.identifier.issn0167-4048
dc.identifier.issn1872-6208
dc.identifier.orcid0000-0002-4080-8042
dc.identifier.orcid0000-0002-0408-0277
dc.identifier.scopus2-s2.0-84915759402
dc.identifier.scopusqualityQ1
dc.identifier.startpage212
dc.identifier.urihttps://doi.org/10.1016/j.cose.2014.10.011
dc.identifier.urihttps://hdl.handle.net/20.500.14854/11140
dc.identifier.volume48
dc.identifier.wosWOS:000347763300014
dc.identifier.wosqualityQ2
dc.indekslendigikaynakWeb of Science
dc.indekslendigikaynakScopus
dc.language.isoen
dc.publisherElsevier Advanced Technology
dc.relation.ispartofComputers & Security
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_WOS_20251020
dc.subjectEnd point security
dc.subjectMalware analysis
dc.subjectMalware detection
dc.subjectMetamorphic malware
dc.subjectWindow of difference
dc.subjectControl flow analysis
dc.subjectHeuristics
dc.subjectData mining
dc.titleA framework for metamorphic malware analysis and real-time detection
dc.typeArticle

Dosyalar