2015 4th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS) 2015
DOI: 10.1109/cfis.2015.7391648
|View full text |Cite
|
Sign up to set email alerts
|

Proposing an HMM-based approach to detect metamorphic malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…Also this objective has been deeply studied in literature, and several reviewed papers target the detection of variants. Given a malicious sample m, variants detection consists in selecting from the available knowledge base the samples that are variants of m [37,30,38,39,40,41].…”
Section: Malware Similarity Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Also this objective has been deeply studied in literature, and several reviewed papers target the detection of variants. Given a malicious sample m, variants detection consists in selecting from the available knowledge base the samples that are variants of m [37,30,38,39,40,41].…”
Section: Malware Similarity Analysismentioning
confidence: 99%
“…Among reviewed works, the majority relies on dynamic analyses [42,55,56,15,44,16,60,57,66,46,50,58,24,26,28,30,51,52,53,35,40], while the others use, in equal proportions, either static analyses alone [11,12,63,64,72,17,65,19,47,49,61,22,23,25,31,73,27,29,37,38,54,67,74,39] or a combination of static and dynamic techniques [75,18,21,48,20,…”
Section: Feature Extractionmentioning
confidence: 99%
“…One example of the sequence of transactions can be shown as llmhmlhm. The types of purchases such [13], [27], [43], [86], [93], [101], [107] [2], [34], [39], [50], [59], [113], [118] [30], [41], [77], [83] [4], [8], [17], [36], [38], [42] [6], [7], [18], [48], [74], [92] [28], [33], [40], [47], [53], [67], [71], [97], [105], [114], [116], [119] [54], [55], [112] [15], [70], [77], [95], [99], [102] [10], [44], [66] [41], [53], [56], [74],…”
Section: Credit Card Fraud Detectionmentioning
confidence: 99%
“…Using the HMM, we can compute the similarities between the 2 behaviors; this is of great importance when detecting such viruses. The most prominent research concerning internet malware detection includes [4,8,17,36,38,57]. These works aim to create an HMM to detect malware such as botnets and viruses to prevent their destructive behavior in the network.…”
Section: Malware Detectionmentioning
confidence: 99%
“…Moreover, Hidden Markov Model (HMM) in its crude form has been applied to identify malware instances; however, the metamorphic malware instances which completely transformed themselves could not be easily determined using HMM. Therefore, a strategy to extract only the important sequences of malware software op-code to train the HMM have been explored in [130].…”
Section: Recent Research Status In Mutating Malware Characterizationmentioning
confidence: 99%