期刊文献+

An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection

An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection
下载PDF
导出
摘要 Polymorphic malware is a secure menace for application of computer network systems because hacker can evade detection and launch stealthy attacks. In this paper, a novel enhanced automated signature generation (EASG) algorithm to detect polymorphic malware is proposed. The EASG algorithm is composed of enhanced-expectation maximum algorithm and enhanced K-means clustering algorithm. In EASG algorithm, the fixed threshold value is replaced by the decision threshold of interval area. The false positive ratio can be controlled at low level, and the iterative operations and the execution time are effectively reduced. Moreover, the centroid updating is realized by application of similarity metric of Mahalanobis distance and incremental learning. Different malware group families are partitioned by the centroid updating. Polymorphic malware is a secure menace for application of computer network systems because hacker can evade detection and launch stealthy attacks. In this paper, a novel enhanced automated signature generation (EASG) algorithm to detect polymorphic malware is proposed. The EASG algorithm is composed of enhanced-expectation maximum algorithm and enhanced K-means clustering algorithm. In EASG algorithm, the fixed threshold value is replaced by the decision threshold of interval area. The false positive ratio can be controlled at low level, and the iterative operations and the execution time are effectively reduced. Moreover, the centroid updating is realized by application of similarity metric of Mahalanobis distance and incremental learning. Different malware group families are partitioned by the centroid updating.
出处 《Journal of Electronic Science and Technology》 CAS 2010年第2期114-121,共8页 电子科技学刊(英文版)
基金 supported by the National 11th Five-Year-Support-Plan of China under Grant No.2006BAH02A0407 the National Research Foundation for the Doctoral Program of Higher Education of China under Grant No.20060614016 the National Natural Science Foundation of China under Grant No. 60671033
关键词 Index Terms -Entropy false positive ratio Mahalanobis distance polymorphie malware signature generation. Index Terms -Entropy, false positive ratio, Mahalanobis distance, polymorphie malware, signature generation.
  • 相关文献

参考文献11

  • 1Xindong Wu,Vipin Kumar,J. Ross Quinlan,Joydeep Ghosh,Qiang Yang,Hiroshi Motoda,Geoffrey J. McLachlan,Angus Ng,Bing Liu,Philip S. Yu,Zhi-Hua Zhou,Michael Steinbach,David J. Hand,Dan Steinberg.Top 10 algorithms in data mining[J].Knowledge and Information Systems.2008(1)
  • 2Z.-C. Li,,L.-J. Wang,,Y. Chen,,Z.-J. Fu."Network-based and attack-resilient length signature generation for zero-day polymorphic worms,"[].Proc of IEEE International Conference on Network Protocols.2007
  • 3B. Stephenson,B. Sikdar."A quasi-species approach for modeling the dynamics of polymorphic worms,"[].Proc of the th IEEE International Conference on Computer Communication.2006
  • 4V. Gundy,M. H. Chen,Z. Su,G. Vigna."Feature omission vulnerabilities: thwarting signature generation for polymorphic worms,"[].Proc of the th Annual Computer Security Applications Conference.2007
  • 5K. Tatara,Y. Hori,K. Sakurai."Analyzing maximum length of instruction sequence in network packets for polymorphic worm detection,"[].Proc of International Conference on Multimedia and Ubiquitous Engineering.2008
  • 6B. Bayoglu,I. Sogukpinar."Polymorphic worm detection using token-pair signatures,"[].Proc of the th International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing.2008
  • 7J. Newsome,,B. Karp,,D. Song."Polygraph: automatically generating signatures for polymorphic worms,"[].Proc of the IEEE Symposium on Security and Privacy.2005
  • 8L. Cavallaro,A. Lanzi,L. Mayer,M. Monga."LISABETH: automated content-based signature generatorfor zero-day polymorphic worms,"[].Proc of the th International workshop on Software engineering for secure systems.2008
  • 9X. Bai,S. Luo,Y. Zhao."Entropy based soft K-means clustering,"[].Proc of IEEE International Conference on Granular Computing.2008
  • 10A.Patcha,J.Park.An Overview of Anomaly Detection Techniques:Existing Solutions and Latest Technological Trends[].Computer Networks.2007

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部