Malware is any computer software potentially harmful to both computers and networks. The amount of malware is growing every year and poses a serious global security threat. Signature-based detection is the most extended method in commercial antivirus software, however, it consistently fails to detect new malware. Supervised machine learning has been adopted to solve this issue. There are two types of features that supervised malware detectors use: (i) static features and (ii) dynamic features. Static features are extracted without executing the sample whereas dynamic ones requires an execution. Both approaches have their advantages and disadvantages. In this paper, we propose for the first time, OPEM, an hybrid unknown malware detector which combines the frequency of occurrence of operational codes (statically obtained) with the information of the execution trace of an executable (dynamically obtained). We show that this hybrid approach enhances the performance of both approaches when run separately. © 2013 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Santos, I., Devesa, J., Brezo, F., Nieves, J., & Bringas, P. G. (2013). OPEM: A static-dynamic approach for machine-learning-based malware detection. In Advances in Intelligent Systems and Computing (Vol. 189 AISC, pp. 271–280). Springer Verlag. https://doi.org/10.1007/978-3-642-33018-6_28
Mendeley helps you to discover research relevant for your work.