Metamorphic malware detection based on support vector machine classification of malware sub-signatures

10Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Achieving accurate and efficient metamorphic malware detection remains a challenge. Metamorphic malware is able to mutate and alter its code structure in each infection that can circumvent signature matching detection. However, some vital functionalities and code segments remain unchanged between mutations. We exploit these unchanged features by the mean of classification using Support Vector Machine (SVM). N-gram features are extracted directly from malware binaries to avoid disassembly, which these features are then masked with the extracted known malware signature n-grams. These masked features reduce the number of selected n-gram features considerably. Our method is capable to accurately detect metamorphic malware with ~99% accuracy and low false positive rate. The proposed method is also superior to commercially available anti-viruses for detecting metamorphic malware.

Cite

CITATION STYLE

APA

Khammas, B. M., Monemi, A., Ismail, I., Nor, S. M., & Marsono, M. N. (2016). Metamorphic malware detection based on support vector machine classification of malware sub-signatures. Telkomnika (Telecommunication Computing Electronics and Control), 14(3), 1157–1165. https://doi.org/10.12928/telkomnika.v14i3.3850

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free