Performance of malware detection tools: A comparison

作者: Sudhir Kumar Pandey , B.M. Mehtre

DOI: 10.1109/ICACCCT.2014.7019422

关键词:

摘要: Malwares are a big threat to modern computer world. There many tools and techniques for detecting malwares, like Intrusion Detection System, Firewalls Virus scans etc. But malicious executables unseen zero day malwares still major challenge. In this paper, we going present performance comparison of existing malware detection. order know the detection tools, have created virtual Malware analysis lab using box. We taken 17 most commonly known 29 as data set our comparison. tested analyzed on basis several parameters which also shown graphically. It is found that top three (based certain given set) Regshot, Process Monitor Explorer.

参考文章(13)
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, Jyh-Charn Liu, Shadow attacks: automatically evading system-call-behavior based malware detection Journal of Computer Virology and Hacking Techniques. ,vol. 8, pp. 1- 13 ,(2012) , 10.1007/S11416-011-0157-5
Peidai Xie, Xicheng Lu, Jinshu Su, Yongjun Wang, Meijian Li, iPanda: A comprehensive malware analysis tool international conference on information networking. pp. 481- 486 ,(2013) , 10.1109/ICOIN.2013.6496427
Sudhir Kumar Pandey, B.M. Mehtre, A Lifecycle Based Approach for Malware Analysis international conference on communication systems and network technologies. pp. 767- 771 ,(2014) , 10.1109/CSNT.2014.161
Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel, A survey on automated dynamic malware-analysis techniques and tools ACM Computing Surveys. ,vol. 44, pp. 6- ,(2008) , 10.1145/2089125.2089126
Pele Li, Mehdi Salour, Xiao Su, A survey of internet worm detection and containment IEEE Communications Surveys and Tutorials. ,vol. 10, pp. 20- 35 ,(2008) , 10.1109/COMST.2008.4483668
Dmitriy Komashinskiy, Igor Kotenko, None, Malware Detection by Data Mining Techniques Based on Positionally Dependent Features parallel, distributed and network-based processing. pp. 617- 623 ,(2010) , 10.1109/PDP.2010.30
Mohamad Fadli Zolkipli, Aman Jantan, An approach for malware behavior identification and classification international conference on computer research and development. ,vol. 1, pp. 191- 194 ,(2011) , 10.1109/ICCRD.2011.5764001
Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya Debray, A semantics-based approach to malware detection ACM Transactions on Programming Languages and Systems. ,vol. 30, pp. 1- 54 ,(2008) , 10.1145/1387673.1387674
G. Ganesh Sundarkumar, Vadlamani Ravi, Malware detection by text and data mining international conference on computational intelligence and computing research. pp. 1- 6 ,(2013) , 10.1109/ICCIC.2013.6724229