Performance of Malware Detection Tools: A Comparison

被引:0
作者
Pandey, Sudhir Kumar [1 ,3 ]
Mehtre, B. M. [2 ,3 ]
机构
[1] Univ Hyderabad, Hyderabad, Andhra Pradesh, India
[2] Ctr Informat Assurance & Management, Hyderabad, Andhra Pradesh, India
[3] Inst Dev & Res Banking Technol, Hyderabad, Andhra Pradesh, India
来源
2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT) | 2014年
关键词
Malware; Intrusion Detection System; Zero Day Malwares; Malicious executables; Malware Analysis; Cyber Defense;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malwares are a big threat to modern computer world. There are many tools and techniques for detecting malwares, like Intrusion Detection System, Firewalls and Virus scans etc. But malicious executables like unseen zero day malwares are still a major challenge. In this paper, we are going to present a performance comparison of existing tools and techniques for malware detection. In order to know the performance of malware detection tools, we have created a virtual Malware analysis lab using virtual box. We have taken 17 most commonly known malware detection tools and 29 malwares as a data set for our comparison. We have tested and analyzed the performance of malware detection tools on the basis of several parameters which are also shown graphically. It is found that the top three tools (based on certain parameters and the given data set) are the Regshot, Process Monitor and Process Explorer.
引用
收藏
页码:1811 / 1817
页数:7
相关论文
共 10 条
  • [1] [Anonymous], 2005, WHIT PAP BRIEF HIST
  • [2] Aycock J., 2006, COMPUTER VIRUS MALWA
  • [3] Griffin K, 2009, LECT NOTES COMPUT SC, V5758, P101, DOI 10.1007/978-3-642-04342-0_6
  • [4] Idika N, 2007, SURVEY MALWARE DETEC
  • [5] Komashinskiy Dmitriy, 2010, MALWARE DETECTION DA
  • [6] Lee W., 1998, P 7 C USENIX SEC S, V7, P7
  • [7] A SURVEY OF INTERNET WORM DETECTION AND CONTAINMENT
    Li, Pele
    Salour, Mehdi
    Su, Xiao
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (01): : 20 - 35
  • [8] Ma Weiqin, 2011, J COMPUT SPRINGER, V8, P1
  • [9] Peidai Xie, 2013, 2013 International Conference on Information Networking (ICOIN), P481, DOI 10.1109/ICOIN.2013.6496427
  • [10] A semantics-based approach to malware detection
    Preda, Mila Dalla
    Christodorescu, Mihai
    Jha, Somesh
    Debray, Saumya
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 30 (05):