Skip to main content
Top

2016 | OriginalPaper | Chapter

Malware Detection Using Higher Order Statistical Parameters

Authors : Easwaramoorthy Arul, Venugopal Manikandan

Published in: Digital Connectivity – Social Impact

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Malware holds an important place in system performance degradation and information embezzling from the victim system. Most of the malware writers choose their path to reach the victim system through the internet, infected browsers, injected files, memory devices, etc., highly obscured malwares evade the automated tools installed in the victim. Once the victim system gets affected by the malware, executable processes are controlled by malware. In this paper, an algorithm has been developed to identify the malware using image processing. The malware detection process has three phases. In first phase, the files (.exe) are converted into a gray scale image. The binary values of corresponding files are converted into 8 - bit gray scale intensity value. The band pass frequency of gray scale image is computed in second phase. In the final phase, third and fourth order statistical parameter such as skewness and kurtosis are calculated at the each sub region of band pass frequency image. The region which has the highest skewness and kurtosis value is marked as the malware file. The detection performance of the proposed method has been evaluated by using 1300 portable executable files. The detection method has a true positive ratio of 93.33% with 0.1 false positives. Preliminary results indicate that the proposed algorithm is better than other conventional malware detection methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)CrossRef Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)CrossRef
4.
go back to reference Hsu, F.H., Tso, C.K., Yeh, Y.C., Wang, W.J., Chen, L.H.: Browser guard: a behavior-based solution to drive-by-download attacks. IEEE J. Sel. Areas Commun. 29(7) (2011). doi:10.1109/JSAC.2011.110811 Hsu, F.H., Tso, C.K., Yeh, Y.C., Wang, W.J., Chen, L.H.: Browser guard: a behavior-based solution to drive-by-download attacks. IEEE J. Sel. Areas Commun. 29(7) (2011). doi:10.​1109/​JSAC.​2011.​110811
5.
go back to reference Watson, M.R., Shirazi, N.U.H., Marnerides, A.K., Mauthe, A., Hutchison, D.: Malware detection in cloud computing infrastructures. IEEE Trans. Dependable Secur. Comput. doi:10.1109/TDSC.2015.2457918 Watson, M.R., Shirazi, N.U.H., Marnerides, A.K., Mauthe, A., Hutchison, D.: Malware detection in cloud computing infrastructures. IEEE Trans. Dependable Secur. Comput. doi:10.​1109/​TDSC.​2015.​2457918
6.
go back to reference Butler, P., Rhodes, A., Hasan, R.: MANTICORE: masking all network traffic via IP concealment with OpenVPN relaying to EC2. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). Print ISBN: 978-1-4673-2892-0, doi:10.1109/CLOUD.2012.29 Butler, P., Rhodes, A., Hasan, R.: MANTICORE: masking all network traffic via IP concealment with OpenVPN relaying to EC2. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). Print ISBN: 978-1-4673-2892-0, doi:10.​1109/​CLOUD.​2012.​29
7.
go back to reference Komashinskiy, D., Kotenko, I.: Malware detection by data mining techniques based on positionally dependent features. In: 2010 18th Euromicro International Conference on Parallel, Distributed, Network-Based Processing (PDP), 17–19 February 2010. ISSN: 1066-6192, doi:10.1109/PDP.2010.30 Komashinskiy, D., Kotenko, I.: Malware detection by data mining techniques based on positionally dependent features. In: 2010 18th Euromicro International Conference on Parallel, Distributed, Network-Based Processing (PDP), 17–19 February 2010. ISSN: 1066-6192, doi:10.​1109/​PDP.​2010.​30
8.
go back to reference Sundarkumar, G.G., Ravi, V.: Malware detection by text, data mining. In: 2013 IEEE International Conference on Computational Intelligence, Computing Research (ICCIC), 26–28 December 2013. ISBN: 978-1-4799-1594-1, doi:10.1109/ICCIC.2013.6724229 Sundarkumar, G.G., Ravi, V.: Malware detection by text, data mining. In: 2013 IEEE International Conference on Computational Intelligence, Computing Research (ICCIC), 26–28 December 2013. ISBN: 978-1-4799-1594-1, doi:10.​1109/​ICCIC.​2013.​6724229
10.
go back to reference Dai, J., Guha, R., Lee, J.: Efficient virus detection using dynamic instruction sequences. J. Comput. 4(5), 405–414 (2009)CrossRef Dai, J., Guha, R., Lee, J.: Efficient virus detection using dynamic instruction sequences. J. Comput. 4(5), 405–414 (2009)CrossRef
11.
go back to reference Makandar, A., Patrot, A.: Malware image analysis and classification using support vector machine. Int. J. Adv. Trends Comput. Sci. Eng. 4(5), 01–03 (2015) Makandar, A., Patrot, A.: Malware image analysis and classification using support vector machine. Int. J. Adv. Trends Comput. Sci. Eng. 4(5), 01–03 (2015)
12.
go back to reference Anderson, B., Quist, D., Neil, J., Storlie, C., Lane, T.: Graph-based malware detection using dynamic analysis. J. Comput. Virol. 7(4), 247–258 (2011). First online: 08 June 2011CrossRef Anderson, B., Quist, D., Neil, J., Storlie, C., Lane, T.: Graph-based malware detection using dynamic analysis. J. Comput. Virol. 7(4), 247–258 (2011). First online: 08 June 2011CrossRef
13.
go back to reference Ahmed, I., Lhee, K.-S.: Classification of packet contents for malware detection. J. Comput. Virol. 7, 279 (2011). First online: 22 October 2011CrossRef Ahmed, I., Lhee, K.-S.: Classification of packet contents for malware detection. J. Comput. Virol. 7, 279 (2011). First online: 22 October 2011CrossRef
14.
go back to reference Fuyong, Z., Deyu, Q.: Run-time malware detection based on positive selection. J. Comput. Virol. 7, 267 (2011). First online: 28 July 2011CrossRef Fuyong, Z., Deyu, Q.: Run-time malware detection based on positive selection. J. Comput. Virol. 7, 267 (2011). First online: 28 July 2011CrossRef
15.
go back to reference Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, Article No. 4. ISBN: 978-1-4503-0679-9, doi:10.1145/2016904.2016908 Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, Article No. 4. ISBN: 978-1-4503-0679-9, doi:10.​1145/​2016904.​2016908
16.
go back to reference Tsatsanis, M.K., Giannakis, G.B.: Object and texture classification using higher-order statistics. IEEE Trans. Pattern Anal. Mach. Intell. 14(7), 733–750 (1992)CrossRef Tsatsanis, M.K., Giannakis, G.B.: Object and texture classification using higher-order statistics. IEEE Trans. Pattern Anal. Mach. Intell. 14(7), 733–750 (1992)CrossRef
17.
go back to reference Gurcan, M.N., Yardimci, Y., Cetin, A.E., Ansari, R.: Detection of microcalcifications in mammograms using higher order statistics. IEEE Signal Process. Lett. 4(8), 213–216 (1997)CrossRef Gurcan, M.N., Yardimci, Y., Cetin, A.E., Ansari, R.: Detection of microcalcifications in mammograms using higher order statistics. IEEE Signal Process. Lett. 4(8), 213–216 (1997)CrossRef
18.
go back to reference Balakumaran, T., Vennila, I.: A computer aided diagnosis system for microcalcification cluster detection in digital mammogram. Int. J. Comput. Appl. 34(1), 39–45 (2011) Balakumaran, T., Vennila, I.: A computer aided diagnosis system for microcalcification cluster detection in digital mammogram. Int. J. Comput. Appl. 34(1), 39–45 (2011)
19.
go back to reference Oliva, A., Torralba, A.: Modeling the shape of the scene: a holistic representation of the spatial envelope. Int. J. Comput. Vis. 42(3), 145–175 (2001)CrossRefMATH Oliva, A., Torralba, A.: Modeling the shape of the scene: a holistic representation of the spatial envelope. Int. J. Comput. Vis. 42(3), 145–175 (2001)CrossRefMATH
20.
go back to reference Kirat, D., Nataraj, L., Vigna, G., Manjunath, B.S.: SigMal: a static signal processing based malware triage. In: Proceedings 29th Annual Computer Security Applications Conference, pp. 89–98, December 2013 Kirat, D., Nataraj, L., Vigna, G., Manjunath, B.S.: SigMal: a static signal processing based malware triage. In: Proceedings 29th Annual Computer Security Applications Conference, pp. 89–98, December 2013
21.
go back to reference Wu, P., Guo, Q., Song, H., Tang, X.: A guess to detect the downloader-like programs. In: Proceedings of the Ninth International Symposium Distributed Computing and Applications to Business Engineering and Science, Hong Kong, China, 10–12 August 2010 Wu, P., Guo, Q., Song, H., Tang, X.: A guess to detect the downloader-like programs. In: Proceedings of the Ninth International Symposium Distributed Computing and Applications to Business Engineering and Science, Hong Kong, China, 10–12 August 2010
Metadata
Title
Malware Detection Using Higher Order Statistical Parameters
Authors
Easwaramoorthy Arul
Venugopal Manikandan
Copyright Year
2016
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-10-3274-5_4

Premium Partner