메뉴 건너뛰기




Volumn 13, Issue 1, 2017, Pages 1-12

A comparison of static, dynamic, and hybrid analysis for malware detection

Author keywords

[No Author keywords available]

Indexed keywords

HIDDEN MARKOV MODELS;

EID: 84952030369     PISSN: None     EISSN: 22638733     Source Type: Journal    
DOI: 10.1007/s11416-015-0261-z     Document Type: Article
Times cited : (360)

References (50)
  • 1
    • 85010853328 scopus 로고    scopus 로고
    • Using spatio-temporal information in API calls with machine learning algorithms for malware detection
    • Ahmed, F. et al: Using spatio-temporal information in API calls with machine learning algorithms for malware detection, ACM Workshop on Security and Artificial Intelligence (2009)
    • (2009) ACM Workshop on Security and Artificial Intelligence
    • Ahmed, F.1
  • 2
    • 80255137449 scopus 로고    scopus 로고
    • Graph-based malware detection using dynamic analysis
    • Anderson, B., et al.: Graph-based malware detection using dynamic analysis. J. Comput. Virol. 7(4), 247–258 (2011)
    • (2011) J. Comput. Virol. , vol.7 , Issue.4 , pp. 247-258
    • Anderson, B.1
  • 4
    • 67349123665 scopus 로고    scopus 로고
    • Profile Hidden Markov Models and metamorphic virus detection
    • Attaluri, S., McGhee, S., Stamp, M.: Profile Hidden Markov Models and metamorphic virus detection. J. Comput. Virol. 5(2), 151–169 (2009)
    • (2009) J. Comput. Virol. , vol.5 , Issue.2 , pp. 151-169
    • Attaluri, S.1    McGhee, S.2    Stamp, M.3
  • 6
  • 7
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • Borello, J., Me, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)
    • (2008) J. Comput. Virol. , vol.4 , Issue.3 , pp. 211-220
    • Borello, J.1    Me, L.2
  • 8
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. J. Pattern Recogn. 30(7), 1145–1159 (1997)
    • (1997) J. Pattern Recogn. , vol.30 , Issue.7 , pp. 1145-1159
    • Bradley, A.P.1
  • 9
    • 85010911434 scopus 로고    scopus 로고
    • Buster Sandbox Analyser. Accessed 20 Dec 2015
    • Buster Sandbox Analyser. http://bsa.isoftware.nl/. Accessed 20 Dec 2015
  • 10
    • 84874138160 scopus 로고    scopus 로고
    • Choi, Y.H. et al.: Toward extracting malware features for classification using static and dynamic analysis. Computing and Networking Technology (ICCNT), Gueongju, South Korea, pp. 126–129
    • Choi, Y.H. et al.: Toward extracting malware features for classification using static and dynamic analysis. Computing and Networking Technology (ICCNT), Gueongju, South Korea, pp. 126–129
  • 11
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • Bellevue: WA
    • Christodorescu,M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceeding of USENIX Security Symposium. Bellevue, WA, pp. 169–186. http://www.cs.cornell.edu/courses/cs711/2005fa/papers/cj-usenix03.pdf
    • Proceeding of USENIX Security Symposium , pp. 169-186
  • 12
    • 77952602657 scopus 로고    scopus 로고
    • Efficient virus detection using dynamic instruction sequences
    • Dai, J., Guha, R., Lee, J.: Efficient virus detection using dynamic instruction sequences. J. Comput. 4(5), 405–414 (2009)
    • (2009) J. Comput. , vol.4 , Issue.5 , pp. 405-414
    • Dai, J.1    Guha, R.2    Lee, J.3
  • 13
    • 85010853306 scopus 로고    scopus 로고
    • Combining dynamic and static analysis for malware detection, Master’s report, Department of Computer Science
    • Damodaran, A.: Combining dynamic and static analysis for malware detection, Master’s report, Department of Computer Science, San Jose State University, 2015. http://scholarworks.sjsu.edu/etd_projects/391/
    • (2015) San Jose State University
    • Damodaran, A.1
  • 14
    • 85010857763 scopus 로고    scopus 로고
    • Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves
    • Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves, http://www.autonlab.org/icml_documents/camera-ready/030_The_Relationship_Bet.pdf
  • 15
    • 85010848616 scopus 로고    scopus 로고
    • Metamorphic detection using function call graph analysis, Master’s report, Department of Computer Science
    • Deshpande, P.: Metamorphic detection using function call graph analysis, Master’s report, Department of Computer Science, San Jose State University, 2013, http://scholarworks.sjsu.edu/etd_projects/336/
    • (2013) San Jose State University
    • Deshpande, P.1
  • 19
    • 84859034694 scopus 로고    scopus 로고
    • A graph mining approach for detecting unknown malwares
    • Eskandari, M., Hashemi, S.: A graph mining approach for detecting unknown malwares. J. Vis. Lang. Comput. 23(3), 154–162 (2012)
    • (2012) J. Vis. Lang. Comput. , vol.23 , Issue.3 , pp. 154-162
    • Eskandari, M.1    Hashemi, S.2
  • 20
    • 84876424144 scopus 로고    scopus 로고
    • HDM-Analyser: A hybrid analysis approach based on data mining techniques for malware detection
    • Eskandari, M., Khorshidpour, Z., Hashemi, S.: HDM-Analyser: A hybrid analysis approach based on data mining techniques for malware detection. J. Comput. Virol. Hack. Techn. 9(2), 77–93 (2013)
    • (2013) J. Comput. Virol. Hack. Techn. , vol.9 , Issue.2 , pp. 77-93
    • Eskandari, M.1    Khorshidpour, Z.2    Hashemi, S.3
  • 22
    • 85010911398 scopus 로고    scopus 로고
    • Fawcett. T.: An introduction to ROC analysis
    • Fawcett. T.: An introduction to ROC analysis. http://people.inf.elte.hu/kiss/13dwhdm/roc.pdf
  • 23
    • 0035247059 scopus 로고    scopus 로고
    • An introduction to hidden Markov models and Bayesian networks
    • Ghahramani, Z.: An introduction to hidden Markov models and Bayesian networks. Int. J. Pattern Recognit. Artif. Intell. 15(1), 9–42 (2001)
    • (2001) Int. J. Pattern Recognit. Artif. Intell. , vol.15 , Issue.1 , pp. 9-42
    • Ghahramani, Z.1
  • 24
    • 85010912537 scopus 로고    scopus 로고
    • Harebot
    • Harebot.: http://www.pandasecurity.com/homeusers/security-info/220319/Harebot.M
  • 25
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: From a survey towards an established taxonomy
    • Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: From a survey towards an established taxonomy. J. Comput. Virol. 4(3), 251–266 (2008)
    • (2008) J. Comput. Virol. , vol.4 , Issue.3 , pp. 251-266
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 26
    • 84945139460 scopus 로고    scopus 로고
    • Singular value decomposition and metamorphic detection
    • Jidigam, R.K., Austin, T.H., Stamp, M.: Singular value decomposition and metamorphic detection. J. Comput. Virol. Hack. Techn 11(4), 203–216 (2015)
    • (2015) J. Comput. Virol. Hack. Techn , vol.11 , Issue.4 , pp. 203-216
    • Jidigam, R.K.1    Austin, T.H.2    Stamp, M.3
  • 27
    • 85076206522 scopus 로고    scopus 로고
    • Kolbitsch, C. et al.: Effective and efficient malware detection at the end host. In: Proceedings of the 18th conference on USENIX security symposium, pp. 351–366. Montreal Canada
    • Kolbitsch, C. et al.: Effective and efficient malware detection at the end host. In: Proceedings of the 18th conference on USENIX security symposium, pp. 351–366. Montreal Canada. https://www.usenix.org/legacy/event/sec09/tech/full_papers/kolbitsch.pdf
  • 28
    • 84936742903 scopus 로고    scopus 로고
    • Compression-based analysis of metamorphic malware
    • Lee, J., Austin, T.H., Stamp, M.: Compression-based analysis of metamorphic malware. Int. J. Secur. Netw 10(2), 124–136 (2015)
    • (2015) Int. J. Secur. Netw , vol.10 , Issue.2 , pp. 124-136
    • Lee, J.1    Austin, T.H.2    Stamp, M.3
  • 29
    • 84881183138 scopus 로고    scopus 로고
    • Driving in the cloud: An analysis of drive-by download operations and abuse reporting, Proceedings of the 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Berlin, Germany
    • Nappa, A., Rafique, M.Z. and Caballero, J.: Driving in the cloud: An analysis of drive-by download operations and abuse reporting, Proceedings of the 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Berlin, Germany, July (2013)
    • (2013) July
    • Nappa, A.1    Rafique, M.Z.2    Caballero, J.3
  • 31
    • 84888873413 scopus 로고    scopus 로고
    • Deriving common malware behavior through graph clustering
    • Park, Y., Reeves, D. and Stamp, M.: Deriving common malware behavior through graph clustering. Comput. Secur. 39(B):419–430 (2013)
    • (2013) Comput. Secur , vol.39 , Issue.B , pp. 419-430
    • Park, Y.1    Reeves, D.2    Stamp, M.3
  • 33
    • 78249234136 scopus 로고    scopus 로고
    • Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory. Recent Adv. Intrusion Detect. Lect. Notes Comput
    • Rhee, J., Riley, R., Xu, D., Jiang, X.: Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory. Recent Adv. Intrusion Detect. Lect. Notes Comput. Sci. 6307, 178–197 (2010)
    • (2010) Sci , vol.6307 , pp. 178-197
    • Rhee, J.1    Riley, R.2    Xu, D.3    Jiang, X.4
  • 34
    • 0024610919 scopus 로고    scopus 로고
    • Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proc IEEE 77(2):257–286 (1989)
    • Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proc IEEE 77(2):257–286 (1989). http://www.cs.ubc.ca/~murphyk/Bayes/rabiner.pdf
  • 35
    • 84860621757 scopus 로고    scopus 로고
    • Opcode graph similarity and metamorphic detection
    • Runwal, N., Low, R.M., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1–2), 37–52 (2012)
    • (2012) J. Comput. Virol. , vol.8 , Issue.1-2 , pp. 37-52
    • Runwal, N.1    Low, R.M.2    Stamp, M.3
  • 36
    • 85010861605 scopus 로고    scopus 로고
    • SandBoxie.
    • SandBoxie. http://sandboxie.com/
  • 37
    • 85010884156 scopus 로고    scopus 로고
    • Security Shield.
    • Security Shield. http://www.symantec.com/security_response/glossary/define.jsp?letter=s&word=security-shield
  • 39
    • 84880591935 scopus 로고    scopus 로고
    • Simple substitution distance and metamorphic detection
    • Shanmugam, G., Low, R.M., Stamp, M.: Simple substitution distance and metamorphic detection. J. Comput. Virol. Hack. Techn. 9(3), 159–170 (2013)
    • (2013) J. Comput. Virol. Hack. Techn. , vol.9 , Issue.3 , pp. 159-170
    • Shanmugam, G.1    Low, R.M.2    Stamp, M.3
  • 40
    • 85010845285 scopus 로고    scopus 로고
    • Support Vector Machines and metamorphic malware detection, Master’s report, Department of Computer Science
    • Singh, T.: Support Vector Machines and metamorphic malware detection, Master’s report, Department of Computer Science, San Jose State University (2015). http://scholarworks.sjsu.edu/etd_projects/409/
    • (2015) San Jose State University
    • Singh, T.1
  • 41
    • 85010849097 scopus 로고    scopus 로고
    • Smart HDD.
    • Smart HDD. http://support.kaspersky.com/viruses/rogue?qid=208286454
  • 42
    • 80255131297 scopus 로고    scopus 로고
    • Comparing files using structural entropy
    • Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259–265 (2011)
    • (2011) J. Comput. Virol. , vol.7 , Issue.4 , pp. 259-265
    • Sorokin, I.1
  • 43
    • 85010845957 scopus 로고    scopus 로고
    • Stamp, M.: A revealing introduction to hidden Markov models (2012)
    • Stamp, M.: A revealing introduction to hidden Markov models (2012). http://www.cs.sjsu.edu/~stamp/RUA/HMM.pdf
  • 44
    • 85010849094 scopus 로고    scopus 로고
    • Internet Security Report
    • Symantec White Paper, Internet Security Report, vol 20, (2015). http://www.symantec.com/security_response/publications/threatreport.jsp
    • (2015) vol 20
  • 45
    • 84874559655 scopus 로고    scopus 로고
    • Chi-squared distance and metamorphic virus detection
    • Toderici, A.H., Stamp, M.: Chi-squared distance and metamorphic virus detection. J. Comput. Virol. Hack. Techn. 9(1), 1–14 (2013)
    • (2013) J. Comput. Virol. Hack. Techn. , vol.9 , Issue.1 , pp. 1-14
    • Toderici, A.H.1    Stamp, M.2
  • 46
    • 85010878414 scopus 로고    scopus 로고
    • Trojan.Zbot
    • Trojan.Zbot. http://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99
  • 47
    • 85010838241 scopus 로고    scopus 로고
    • Trojan.ZeroAccess.
    • Trojan.ZeroAccess. http://www.symantec.com/security_response/writeup.jsp?docid=2011-071314-0410-99
  • 48
    • 85010878415 scopus 로고    scopus 로고
    • Win32/Winwebsec
    • Win32/Winwebsec. http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Win32%2fWinwebsec
  • 49
    • 33751208937 scopus 로고    scopus 로고
    • Hunting for metamorphic engines
    • Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211–229 (2006)
    • (2006) J. Comput. Virol. , vol.2 , Issue.3 , pp. 211-229
    • Wong, W.1    Stamp, M.2
  • 50
    • 54849412646 scopus 로고    scopus 로고
    • An intelligent PE-malware detection system based on association mining
    • Ye, Y., Wang, D., Li, T., Ye, D., Jiang, Q.: An intelligent PE-malware detection system based on association mining. J. Comput. Virol. 4(4), 323–334 (2008)
    • (2008) J. Comput. Virol. , vol.4 , Issue.4 , pp. 323-334
    • Ye, Y.1    Wang, D.2    Li, T.3    Ye, D.4    Jiang, Q.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.