Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm

作者: Soumyadeep G. Dastidar , Subhrangsu Mandal , Ferdous A. Barbhuiya , Sukumar Nandi

DOI: 10.1007/978-81-322-0491-6_30

关键词:

摘要: Metamorphic viruses dodges the classical signature-based detection system by modifying internal structure without compromising on original functionality. To solve this problem, some machine learning technique, like Hidden Markov model (HMM) and Neural Network are can be used. HMM is a state where each observes input data with appropriate observation probability. learns statistical properties of antivirus features rather than signatures relies such statistics to detect same family virus. Each when trained variants that generated metamorphic engine so similar high But, in order make viruses, there three basic criteria needs satisfied. Generally most based techniques, Baum-Welch method used for solving one problems, i.e, estimating parameters corresponding given an output sequence. In paper, we have Genetic Algorithm problem. The selection algorithm over conventional Baum- Welch lies non-linearity genetic algorithm. algorithm, being linear nature, suffers from local optima which tried overcome using our scheme.

参考文章(11)
Mark Stamp, Sjsu ScholarWorks, Sharmidha Govindaraj, Robert Chun, Practical Detection of Metamorphic Computer Viruses ,(2008)
Wing Wong, Suneuy Kim, Sami Khuri, ANALYSIS AND DETECTION OF METAMORPHIC COMPUTER VIRUSES ,(2006)
G.J. Tesauro, J.O. Kephart, G.B. Sorkin, Neural networks for computer virus recognition IEEE Intelligent Systems. ,vol. 11, pp. 5- 6 ,(1996) , 10.1109/64.511768
A. P. Dempster, N. M. Laird, D. B. Rubin, Maximum Likelihood from Incomplete Data Via theEMAlgorithm Journal of the Royal Statistical Society: Series B (Methodological). ,vol. 39, pp. 1- 22 ,(1977) , 10.1111/J.2517-6161.1977.TB01600.X
Gang Fang, Sargur N. Srihari, Harish Srinivasan, Cyber Threat Trend Analysis Model Using HMM information assurance and security. pp. 177- 182 ,(2007) , 10.1109/IAS.2007.32
Melanie Mitchell, An Introduction to Genetic Algorithms ,(1996)
L.R. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition Proceedings of the IEEE. ,vol. 77, pp. 267- 296 ,(1989) , 10.1109/5.18626
M.G. Schultz, E. Eskin, F. Zadok, S.J. Stolfo, Data mining methods for detection of new malicious executables ieee symposium on security and privacy. pp. 38- 49 ,(2001) , 10.1109/SECPRI.2001.924286
Min Feng, Rajiv Gupta, Detecting virus mutations via dynamic matching international conference on software maintenance. pp. 105- 114 ,(2009) , 10.1109/ICSM.2009.5306329