Overview of Malware Analysis and Detection
نویسندگان
چکیده
Identify a malicious data in a several types of files is a challenging task. Malware is a computer virus this is also a name given to a group of malicious data like umbrella to all types of malicious data like virus, worm, Trojan and so on. Several methods have been devised to smooth the progress of malware analysis and one of them is through visualization techniques. The visualization technique is used to visualize the features of malware or variants in a gray scale image of malware. The malware is visualized as an image with the concepts of image processing techniques it will identify the malware. The malware behaviors are identified in one of them such as encrypted malware, polymorphic malware, metamorphic malware, and obfuscated which have the ability to change their code as they propagate. In this paper different types of malware are discusses briefly with their categorization of malware families. The different techniques are used to identify and classify malware. Which is motivated especially on behaviors of malware samples which are similar in texture and some extent through this we can classify the malware data. This paper provides an overview of existing malware detection techniques with the different types of malware family descriptions.
منابع مشابه
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملMalware Detection using Classification of Variable-Length Sequences
In this paper, a novel method based on the graph is proposed to classify the sequence of variable length as feature extraction. The proposed method overcomes the problems of the traditional graph with variable length of data, without fixing length of sequences, by determining the most frequent instructions and insertion the rest of instructions on the set of “other”, save speed and memory. Acco...
متن کاملMalware Detection from a Virtual Machine Correlating Unusual Keystrokes, Network Traffic, and Suspicious Registry Access
Current anti-virus malware detection methods focus on signature-based methods. Recent research has introduced new, effective methods of malware detection. First, recent research including cloud-based monitoring and analysis, joint network-host based methods, feature ranking, machine learning and kernel data structure invariant monitoring are reviewed. Second, virtual machine based malware detec...
متن کاملUsing Verification Technology to Specify and Detect Malware
Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checking based approach to malware detection can capture the semantics of security exploits more accurately than traditional approaches, and consequently achieve higher detection rates. In this approach, malicious behavior is formali...
متن کاملWhole-system Fine-grained Taint Analysis for Automatic Malware Detection and Analysis
As malware is becoming increasingly sophisticated and stealthy, effective techniques for malware detection and analysis are imperative. Previous detection mechanisms are insufficient. Signature-based detection cannot detect new malware, and watch-point based behavioral detection can be evaded by stealthier design. Most previous analysis mechanisms are too coarse-grained to capture malware behav...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016