Malware detection based on hybrid signature behavior application programming interface call graph

73Citations
Citations of this article
93Readers
Mendeley users who have this article in their library.

Abstract

Problem statement: A malware is a program that has malicious intent. Nowadays, malware authors apply several sophisticated techniques such as packing and obfuscation to avoid malware detection. That makes zero-day attacks and false positives the most challenging problems in malware detection field. Approach: In this study, the static and dynamic analysis techniques that are used in malware detection are surveyed. Static analysis techniques, dynamic analysis techniques and their combination including Signature-Based and Behavior-Based techniques are discussed. Results: In addition, a new malware detection framework is proposed. Conclusion: The proposed framework combines Signature-Based with Behavior-Based using API graph system. The goal of the proposed framework is to improve accuracy and scan process time for malware detection. © 2012 Science Publications.

Cite

CITATION STYLE

APA

Elhadi, A. A. E., Maarof, M. A., & Osman, A. H. (2012). Malware detection based on hybrid signature behavior application programming interface call graph. American Journal of Applied Sciences, 9(3), 283–288. https://doi.org/10.3844/ajassp.2012.283.288

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free