2017
DOI: 10.23956/ijarcsse/v7i2/01218
|View full text |Cite
|
Sign up to set email alerts
|

Short Review on Metamorphic Malware Detection in Hidden Markov Models

Abstract: Abstract-Metamorphic malware is well known for evading signature-based detection. To cope up with numerous malware which can emerge easily by using open source malware generator, efficient detection in terms of accuracy and runtime performance shall be considered during analysis. Detection strategies such as data mining combine with machine learning have been used by researchers for heuristically detecting malware. In this paper, we present Hidden Markov Model as an efficient metamorphic malware detection tool… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…To identify suspicious behaviour, the model also considers how frequently specific behaviours occur. By examining the typical malware obfuscation techniques and contrasting the many research studies that utilize HMM as a detection tool, Ling and Sani [13] in 2017 introduced the Hidden Markov Model as an efficient metamorphic tool for malware detection. In a comprehensive analysis of intrusion detection methods based on hidden Markov models that was published in 2018, Ramaki, Rasoolzadegan, and Jafari [14] highlight the following six key benefits of these methods: The main benefits include accurate intrusion detection, the capacity to identify new intrusions, the capacity to predict an attacker's probable next steps, the ability to be used in real-time applications by processing data streams on the fly, the use of heterogeneous data sources as input, and the ability to visualize the knowledge acquired in comparison to other machine learning techniques.…”
Section: Introductionmentioning
confidence: 99%
“…To identify suspicious behaviour, the model also considers how frequently specific behaviours occur. By examining the typical malware obfuscation techniques and contrasting the many research studies that utilize HMM as a detection tool, Ling and Sani [13] in 2017 introduced the Hidden Markov Model as an efficient metamorphic tool for malware detection. In a comprehensive analysis of intrusion detection methods based on hidden Markov models that was published in 2018, Ramaki, Rasoolzadegan, and Jafari [14] highlight the following six key benefits of these methods: The main benefits include accurate intrusion detection, the capacity to identify new intrusions, the capacity to predict an attacker's probable next steps, the ability to be used in real-time applications by processing data streams on the fly, the use of heterogeneous data sources as input, and the ability to visualize the knowledge acquired in comparison to other machine learning techniques.…”
Section: Introductionmentioning
confidence: 99%
“…It is important to understand and extend already existing implementations of metamorphic engines to understand the weaknesses of our detection strategies like Hidden Markov Model (HMM). According to the previous researches [6]- [8] done in the domain, HMM based detectors have been considered successful in detection of metamorphic malware which have otherwise been able to bypass commercial antiviruses.…”
Section: Introductionmentioning
confidence: 99%
“…However, every biometrics authentication systems have its own shortcomings based on the qualities, capturing device, database, and feature of that quality [11][12][13][14]. To solve the inadequacies of existing based biometric systems, research into finger vein identification comes to the limelight.…”
mentioning
confidence: 99%