Tools & Techniques for Malware Analysis and Classification

被引:0
作者
Gandotra, Ekta [1 ]
Bansal, Divya [1 ]
Sofat, Sanjeev [1 ]
机构
[1] PEC Univ Technol, Chandigarh, India
来源
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING | 2016年 / 7卷 / 03期
关键词
Malware Analysis; Classification; Machine Learning; Automated Analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ever-evolving malware continues to flood the Internet at an alarming rate. This makes it challenging for security organizations and anti-malware vendors to devise effective solutions. It is, therefore, imperative to study automated tools and techniques for quick detection of malware, possibly limiting or preventing any impact on the target. The code or behavioural patterns obtained from malware analysis can be used to classify new malware samples into their existing families and recognize those which possess unknown behaviour and thus need a closer manual inspection. This paper provides a comprehensive review of techniques and tools currently employed for malware analysis and classification. It includes the comparison of tools and techniques for collecting malware, analyzing them statically and dynamically for extracting features and finally classifying these using machine learning methods. It also provides the examples from the literature that analyze executables for extracting useful features and apply machine learning for discriminating malicious software from benign ones.
引用
收藏
页码:176 / 197
页数:22
相关论文
共 52 条
  • [1] Anderson B., 2012, P 5 ACM WORKSHOP SEC, P3, DOI DOI 10.1145/2381896.2381900
  • [2] Graph-based malware detection using dynamic analysis
    Anderson, Blake
    Quist, Daniel
    Neil, Joshua
    Storlie, Curtis
    Lane, Terran
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 247 - 258
  • [3] Baecher P, 2006, LECT NOTES COMPUT SC, V4219, P165
  • [4] Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
  • [5] Bayer U., 2006, TTANALYZE TOOL ANAL
  • [6] Bayer U, 2009, P NDSS, V9, P8
  • [7] Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
  • [8] Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
  • [9] Opcodes as predictor for malware
    Bilar, Daniel
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (02) : 156 - 168
  • [10] Buehlmann S, 2010, JOEBOX SECURE SANDBO