OPEM: A static-dynamic approach for machine-learning-based malware detection

135Citations
Citations of this article
156Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malware is any computer software potentially harmful to both computers and networks. The amount of malware is growing every year and poses a serious global security threat. Signature-based detection is the most extended method in commercial antivirus software, however, it consistently fails to detect new malware. Supervised machine learning has been adopted to solve this issue. There are two types of features that supervised malware detectors use: (i) static features and (ii) dynamic features. Static features are extracted without executing the sample whereas dynamic ones requires an execution. Both approaches have their advantages and disadvantages. In this paper, we propose for the first time, OPEM, an hybrid unknown malware detector which combines the frequency of occurrence of operational codes (statically obtained) with the information of the execution trace of an executable (dynamically obtained). We show that this hybrid approach enhances the performance of both approaches when run separately. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Santos, I., Devesa, J., Brezo, F., Nieves, J., & Bringas, P. G. (2013). OPEM: A static-dynamic approach for machine-learning-based malware detection. In Advances in Intelligent Systems and Computing (Vol. 189 AISC, pp. 271–280). Springer Verlag. https://doi.org/10.1007/978-3-642-33018-6_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free