Structural entropy and metamorphic malware

被引:81
作者
Baysa, Donabelle [1 ]
Low, Richard M. [2 ]
Stamp, Mark [1 ]
机构
[1] San Jose State Univ, Dept Comp Sci, San Jose, CA 95192 USA
[2] San Jose State Univ, Dept Math, San Jose, CA 95192 USA
来源
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES | 2013年 / 9卷 / 04期
关键词
D O I
10.1007/s11416-013-0185-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Metamorphic malware is capable of changing its internal structure without altering its functionality. A common signature is nonexistent in highly metamorphic malware and, consequently, such malware can remain undetected under standard signature scanning. In this paper, we apply previous work on structural entropy to the metamorphic detection problem. This technique relies on an analysis of variations in the complexity of data within a file. The process consists of two stages, namely, file segmentation and sequence comparison. In the segmentation stage, we use entropy measurements and wavelet analysis to segment files. The second stage measures the similarity of file pairs by computing an edit distance between the sequences of segments obtained in the first stage. We apply this similarity measure to the metamorphic detection problem and show that we obtain strong results in certain challenging cases.
引用
收藏
页码:179 / 192
页数:14
相关论文
共 34 条
[1]  
Addison P.S., 2002, ILLUSTRATED WAVELET
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], 2012, VIR FIL
[4]  
Apostolico A, 1997, PATTERN MATCHING ALG
[5]   Profile hidden Markov models and metamorphic virus detection [J].
Attaluri, Srilatha ;
McGhee, Scott ;
Stamp, Mark .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (02) :151-169
[6]  
Aycock J., 2006, COMPUTER VIRUSES MAL, V22
[7]  
Baysa D., 2012, STRUCTURAL ENTROPY M
[8]  
Borda M, 2011, FUNDAMENTALS IN INFORMATION THEORY AND CODING, P1, DOI 10.1007/978-3-642-20347-3
[9]   The use of the area under the roc curve in the evaluation of machine learning algorithms [J].
Bradley, AP .
PATTERN RECOGNITION, 1997, 30 (07) :1145-1159
[10]  
Burford S., 2002, REVERSE ENG LINUX EL