Joma Rajab Salim Alrzini
A review of polymorphic malware detection techniques
Alrzini, Joma Rajab Salim; Pennington, Diane
Abstract
Despite the continuous updating of anti-detection systems for malicious programs (malware), malware has moved to an abnormal threat level; it is being generated and spread faster than before. One of the most serious challenges faced by anti-detection malware programs is an automatic mutation in the code; this is called polymorphic malware via the polymorphic engine. In this case, it is difficult to block the impact of signature-based detection. Hence new techniques have to be used in order to analyse modern malware. One of these techniques is machine learning algorithms in a virtual machine (VM) that can run the packed malicious file and analyse it dynamically through automated testing of the code. Moreover, recent research used image processing techniques with deep learning framework as a hybrid method with two analysis types and extracting a feature engineering approach in the analysis process in order to detect polymorphic malware efficiently. This paper presents a brief review of the latest applied techniques against this type of malware with more focus on the machine learning method for analysing and detecting polymorphic malware. It will discuss briefly the merits and demerits of it.
Citation
Alrzini, J. R. S., & Pennington, D. (2020). A review of polymorphic malware detection techniques. International Journal of Advanced Research in Engineering and Technology, 11(12), 1238-1247. https://doi.org/10.34218/IJARET.11.12.2020.119
Journal Article Type | Article |
---|---|
Publication Date | 2020-12 |
Deposit Date | Feb 3, 2023 |
Journal | International Journal of Advanced Research in Engineering and Technology |
Print ISSN | 0976-6480 |
Electronic ISSN | 0976-6499 |
Peer Reviewed | Peer Reviewed |
Volume | 11 |
Issue | 12 |
Pages | 1238-1247 |
DOI | https://doi.org/10.34218/IJARET.11.12.2020.119 |
Keywords | anti-detection; polymorphic automated testing; abnormal threats; packed malicious file |
Publisher URL | https://iaeme.com/Home/article_id/IJARET_11_12_119 |
You might also like
Stroke recovery—what are people talking about on Twitter? A content analysis
(2024)
Journal Article
Researchers and Social Networking Sites usage: the application of UTAUT theory
(2024)
Journal Article
Digital Humanities and Information Science: Making A Difference?
(2023)
Presentation / Conference Contribution
1001 days with Bookbug: Public libraries' offer for parents and infants
(2023)
Presentation / Conference Contribution
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search