A discrete event system based approach for obfuscated malware detection

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the growing use and popularity of Internet among people, security threats such as viruses, worms etc., are also rapidly increasing. In order to detect and prevent such threats, many antivirus softwares have been created. Signature matching approach used to detect malwares can be easily thwarted by using code obfuscation techniques. In this paper, we propose a discrete event systems-based approach to detect obfuscated malwares in a system, taking Bagle. A as our test virus. Commonly used obfuscation techniques have been applied to bagle. We built DES models for a process under attack and normal conditions with system calls as events. Based on the system calls evoked by any process, our detector will determine its maliciousness by comparing it with both the models.

Cite

CITATION STYLE

APA

Patanaik, C. K., Barbhuiya, F. A., Biswas, S., & Nandi, S. (2015). A discrete event system based approach for obfuscated malware detection. In Lecture Notes in Electrical Engineering (Vol. 347, pp. 3–16). Springer Verlag. https://doi.org/10.1007/978-81-322-2464-8_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free