Skip to main content
Top

2018 | OriginalPaper | Chapter

Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models

Authors : Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp

Published in: Guide to Vulnerability Analysis for Computer Networks and Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Encrypted code is often present in some types of advanced malware, while such code virtually never appears in legitimate applications. Hence, the presence of encrypted code within an executable file could serve as a strong heuristic for malware detection. In this chapter, we consider the feasibility of detecting encrypted segments within an executable file using hidden Markov models.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
An HMM score is dependent on the length of the sequence scored. Therefore, in each case we normalize the score so that it is given as a log likelihood per opcode (LLPO).
 
Literature
4.
go back to reference Stamp M (2011) Information security: principles and practice. Wiley, New York Stamp M (2011) Information security: principles and practice. Wiley, New York
8.
go back to reference Rad BB, Masrom M, Ibrahim S (2012) Camouflage in malware: from encryption to metamorphism. Int J Comput Sci Netw Secur 12(8):74–83 Rad BB, Masrom M, Ibrahim S (2012) Camouflage in malware: from encryption to metamorphism. Int J Comput Sci Netw Secur 12(8):74–83
9.
go back to reference Li X, Loh PKK, Tan F (2011) Mechanisms of polymorphic and metamorphic viruses. In: 2011 European intelligence and security informatics conference. pp 149–154 Li X, Loh PKK, Tan F (2011) Mechanisms of polymorphic and metamorphic viruses. In: 2011 European intelligence and security informatics conference. pp 149–154
13.
go back to reference Zwanger V, Gerhards-Padilla E, Meier M (2014) Codescanner: Detecting (hidden) x86/x64 code in arbitrary files. In: Malicious and unwanted software: the americas (MALWARE), 2014 9th international conference on malicious and unwanted software. IEEE, pp 118–127 Zwanger V, Gerhards-Padilla E, Meier M (2014) Codescanner: Detecting (hidden) x86/x64 code in arbitrary files. In: Malicious and unwanted software: the americas (MALWARE), 2014 9th international conference on malicious and unwanted software. IEEE, pp 118–127
14.
go back to reference Schultz MG, Eskin E, Zadok F, Stolfo SJ (2001) Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE symposium on security and privacy. SP, pp 38–49 Schultz MG, Eskin E, Zadok F, Stolfo SJ (2001) Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE symposium on security and privacy. SP, pp 38–49
17.
go back to reference Jurafsky D, Martin JH (2000) Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 1st edn. Prentice Hall PTR, USA Jurafsky D, Martin JH (2000) Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 1st edn. Prentice Hall PTR, USA
18.
go back to reference Cave RL, Neuwirth LP (1980) Hidden Markov models for English. In: Ferguson JD (ed) Hidden Markov Models for Speech Cave RL, Neuwirth LP (1980) Hidden Markov models for English. In: Ferguson JD (ed) Hidden Markov Models for Speech
22.
go back to reference Rabiner LR (1989) A tutorial on hidden markov models and selected applications in speech recognition. IEEE Proc 77(2):257–286CrossRef Rabiner LR (1989) A tutorial on hidden markov models and selected applications in speech recognition. IEEE Proc 77(2):257–286CrossRef
23.
go back to reference Shanmugam G, Low RM, Stamp M (2013) Simple substitution distance and metamorphic detection. J Comput Virol Hacking Tech 9(3):159–170CrossRef Shanmugam G, Low RM, Stamp M (2013) Simple substitution distance and metamorphic detection. J Comput Virol Hacking Tech 9(3):159–170CrossRef
25.
go back to reference Shamir A, Van Someren N (1999) Playing hide and seek with stored keys. In: International conference on financial cryptography. Springer, Berlin, pp 118–124 Shamir A, Van Someren N (1999) Playing hide and seek with stored keys. In: International conference on financial cryptography. Springer, Berlin, pp 118–124
27.
go back to reference Bradley AP (1997) The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognit 30(7):1145–1159CrossRef Bradley AP (1997) The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognit 30(7):1145–1159CrossRef
Metadata
Title
Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models
Authors
Dhiviya Dhanasekar
Fabio Di Troia
Katerina Potika
Mark Stamp
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_12

Premium Partner