A State of the Art Survey on Polymorphic Malware Analysis and Detection Techniques

作者: John Ngubiri , Julianne Sansa-Otim , Damien Hanyurwimfura , Kyanda Swaib Kaawaase , Emmanuel Masabo

DOI:

关键词:

摘要: Nowadays, systems are under serious security threats caused by malicious software, commonly known as malware. Such malwares sophisticatedly created with advanced techniques that make them hard to analyse and detect, thus causing a lot of damages. Polymorphism is one the which malware change their identity on each time they attack. This paper presents detailed systematic critical review explores available literature, outlines research efforts have been made in relation polymorphic analysis detection.

参考文章(34)
Smita Ranveer, Swapnaja Hiray, Comparative Analysis of Feature Extraction Methods of Malware Detection International Journal of Computer Applications. ,vol. 120, pp. 1- 7 ,(2015) , 10.5120/21220-3960
Timo Harmonen, Identifying polymorphic malware ,(2011)
Razieh Eskandari, Mehdi Shajari, Asadallah Asadi, Automatic signature generation for polymorphic worms by combination of token extraction and sequence alignment approaches conference on information and knowledge technology. pp. 1- 6 ,(2015) , 10.1109/IKT.2015.7288733
Imtithal A.Saeed, Ali Selamat, Ali M. A. Abuagoub, A survey on malware propagation, analysis, and detection International Journal of Computer Applications. ,vol. 67, pp. 25- 31 ,(2013) , 10.5120/11480-7108
Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz, Automatic analysis of malware behavior using machine learning Journal of Computer Security. ,vol. 19, pp. 639- 668 ,(2011) , 10.3233/JCS-2010-0410
Mansour Ahmadi, Ashkan Sami, Hossein Rahimi, Babak Yadegari, Malware detection by behavioural sequential patterns Computer Fraud & Security. ,vol. 2013, pp. 11- 19 ,(2013) , 10.1016/S1361-3723(13)70072-1
Mamoun Alazab, Shamsul Huda, Jemal Abawajy, Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst, A Hybrid Wrapper-Filter Approach for Malware Detection Journal of Networks. ,vol. 9, pp. 2878- 2891 ,(1969) , 10.4304/JNW.9.11.2878-2891
Ilsun You, Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey broadband and wireless computing, communication and applications. pp. 297- 300 ,(2010) , 10.1109/BWCCA.2010.85
Ratinder Kaur, Maninder Singh, Efficient hybrid technique for detecting zero-day polymorphic worms ieee international advance computing conference. pp. 95- 100 ,(2014) , 10.1109/IADCC.2014.6779301
Ratinder Kaur, Maninder Singh, A Survey on Zero-Day Polymorphic Worm Detection Techniques IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 1520- 1549 ,(2014) , 10.1109/SURV.2014.022714.00160