Skip to main content

2017 | OriginalPaper | Buchkapitel

A Framework for Dynamic Malware Analysis Based on Behavior Artifacts

verfasst von : T. G. Gregory Paul, T. Gireesh Kumar

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Malware stands for malicious software. Any file that causes damage to the computer or network can be termed as malicious. For malware analysis, there are two fundamental approaches: static analysis and dynamic analysis. The static analysis focuses on analyzing the file without executing, whereas dynamic analysis means analyzing or observing its behavior while it is being executed. While performing malware analysis, we have to classify malware samples. The different types of malware include worm, virus, rootkit, trojan horse, back door, botnet, ransomware, spyware, adware, and logic bombs. In this paper, our objective is to have a breakdown of techniques used for malware analysis and a comparative study of various malware detection/classification systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sikorski, Michael, and Andrew Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, 2012. Sikorski, Michael, and Andrew Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, 2012.
2.
Zurück zum Zitat Egele, Manuel, et al. “A survey on automated dynamic malware-analysis techniques and tools.” ACM Computing Surveys (CSUR) 44.2 (2012): 6. Egele, Manuel, et al. “A survey on automated dynamic malware-analysis techniques and tools.” ACM Computing Surveys (CSUR) 44.2 (2012): 6.
3.
Zurück zum Zitat Mohaisen, Aziz, Omar Alrawi, and Manar Mohaisen. “Amal: High-fidelity, behavior-based automated malware analysis and classification.” Computers & Security (2015). Mohaisen, Aziz, Omar Alrawi, and Manar Mohaisen. “Amal: High-fidelity, behavior-based automated malware analysis and classification.” Computers & Security (2015).
5.
Zurück zum Zitat Pirscoveanu, Radu S., et al. “Analysis of Malware behavior: Type classification using machine learning.” Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015 International Conference on. IEEE, 2015. Pirscoveanu, Radu S., et al. “Analysis of Malware behavior: Type classification using machine learning.” Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015 International Conference on. IEEE, 2015.
6.
Zurück zum Zitat Shijo, P. V., and A. Salim. “Integrated Static and Dynamic Analysis for Malware Detection.” Procedia Computer Science 46 (2015): 804–811. Shijo, P. V., and A. Salim. “Integrated Static and Dynamic Analysis for Malware Detection.” Procedia Computer Science 46 (2015): 804–811.
7.
Zurück zum Zitat Naval, Smita, et al. “Employing Program Semantics for Malware Detection.” Information Forensics and Security, IEEE Transactions on 10.12 (2015): 2591–2604. Naval, Smita, et al. “Employing Program Semantics for Malware Detection.” Information Forensics and Security, IEEE Transactions on 10.12 (2015): 2591–2604.
9.
Zurück zum Zitat Kawaguchi, Naoto, and Kazumasa Omote. “Malware Function Classification Using APIs in Initial Behavior.” Information Security (AsiaJCIS), 2015 10th Asia Joint Conference on. IEEE, 2015. Kawaguchi, Naoto, and Kazumasa Omote. “Malware Function Classification Using APIs in Initial Behavior.” Information Security (AsiaJCIS), 2015 10th Asia Joint Conference on. IEEE, 2015.
10.
Zurück zum Zitat Ozsoy, Meltem, et al. “Malware-aware processors: A framework for efficient online malware detection.” High Performance Computer Architecture (HPCA), 2015 IEEE 21st International Symposium on. IEEE, 2015. Ozsoy, Meltem, et al. “Malware-aware processors: A framework for efficient online malware detection.” High Performance Computer Architecture (HPCA), 2015 IEEE 21st International Symposium on. IEEE, 2015.
12.
Zurück zum Zitat Jiang, Xuxian, Xinyuan Wang, and Dongyan Xu. “Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction.” Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007. Jiang, Xuxian, Xinyuan Wang, and Dongyan Xu. “Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction.” Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007.
Metadaten
Titel
A Framework for Dynamic Malware Analysis Based on Behavior Artifacts
verfasst von
T. G. Gregory Paul
T. Gireesh Kumar
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_55

Premium Partner