Improving the detection of malware behaviour using simplified data dependent API call graph

62Citations
Citations of this article
69Readers
Mendeley users who have this article in their library.

Abstract

Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. Matching the API call graph using graph matching algorithm have NP-complete problem and is slow because of computational complexity .In this study, a malware detection system based on API call graph is proposed. Each malware sample is represented as data dependent API call graph. After transforming the input sample into a simplified data dependent graph, graph matching algorithm is used to calculate similarity between the input sample and malware API call graph samples stored in a database. The graph matching algorithm is based on Longest Common Subsequence (LCS) algorithm which is used on the simplified graphs. Such strategy reduces the computation complexity by selecting paths with the same edge label in the API call graph. Experimental results on 85 samples demonstrate 98% detection rate and 0% false positive rate for the proposed malware detection system. © 2013 SERSC.

Cite

CITATION STYLE

APA

Elhadi, A. A. E., Maarof, M. A., & Barry, B. I. A. (2013). Improving the detection of malware behaviour using simplified data dependent API call graph. International Journal of Security and Its Applications, 7(5), 29–42. https://doi.org/10.14257/ijsia.2013.7.5.03

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free