2020
DOI: 10.3390/e22050575
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Malware with Information Complexity

Abstract: Malware concealment is the predominant strategy for malware propagation. Black hats create variants of malware based on polymorphism and metamorphism. Malware variants, by definition, share some information. Although the concealment strategy alters this information, there are still patterns on the software. Given a zoo of labelled malware and benign-ware, we ask whether a suspect program is more similar to our malware or to our benign-ware. Normalized Compression Distance (NCD) is a generic metric that measure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(23 citation statements)
references
References 41 publications
0
23
0
Order By: Relevance
“…There have been techniques in the literature that utilize compression-based distance metrics to analyze malicious pieces of code. The work from [1] is based on the notion of normalized information distance (NID) and employ this as a distinguishing feature for training the classifier on.…”
Section: Overview Of Malware Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…There have been techniques in the literature that utilize compression-based distance metrics to analyze malicious pieces of code. The work from [1] is based on the notion of normalized information distance (NID) and employ this as a distinguishing feature for training the classifier on.…”
Section: Overview Of Malware Detectionmentioning
confidence: 99%
“…For this work, we tried the implementation of another benchmark detector based on the information theoretic approach for malware detection, similar to the ones used by [1]. We found the computational limitation of such an approach during the attempted implementation.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The scalability to mount an attack on multiple institutions at once is not expensive compared to the reward. This leads to blackmail to companies/users, disclosure of files or credit card data in the web, or encryption of databases and files [ 9 , 12 , 33 , 34 , 35 , 36 , 37 ]. Identity/Authentication: With the exponential growth of wearables devices, users and devices will need to manage a new authentication mechanism to pair and interact with enhanced features, gathering information from the ECG (electrocardiogram) or similar, for example [ 38 , 39 , 40 , 41 , 42 ].…”
Section: Kolmogorov Complexity Application Scenariosmentioning
confidence: 99%
“…However, their experimental results shown no better than 77% accuracy. Another compression based technique combined with machine learning by Alshahwan et al [3] where a random forest classifier was built using Normalized Compression Distance (NCD) and compressibility ratio features on binary files to detect malware.…”
Section: Metamorphic Malware Detectionmentioning
confidence: 99%