Static Signature-Based Malware Detection Using Opcode and Binary Information

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet continues to evolve and touches every aspect of our daily life thus communications through internet is becoming inevitable. Computer security has been hence becoming one of the important concerns of internet users. Malware, a malicious software, is a harmful code that poses security thread for infected machines, thus malware detection has become one of the most important research topics in computer security. Malware detection methods can be categorized into signature-based, and behavior-based methods; each of which can be performed in a dynamical or static behavior. In this paper, we describe a static signature-based malware detection method based on opcode and binary file signatures. The proposed method is based on N-gram distribution and is improved using a proposed Top K approach which suggests selecting top most similar k files in classification of a new unknown file. The results are evaluated on VXheaven malware binaries, and windows system files are used as a repository of benign binaries.

Cite

CITATION STYLE

APA

Jalilian, A., Narimani, Z., & Ansari, E. (2020). Static Signature-Based Malware Detection Using Opcode and Binary Information. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 45, pp. 24–35). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-37309-2_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free