A Framework for Metamorphic Malware Analysis and Real-Time Detection

dc.contributor.authorAlam, Shahid
dc.contributor.supervisorHorspool, R. Nigel
dc.contributor.supervisorTraore, Issa
dc.date.accessioned2014-08-19T20:08:41Z
dc.date.available2014-08-19T20:08:41Z
dc.date.copyright2014en_US
dc.date.issued2014-08-19
dc.degree.departmentDepartment of Computer Science
dc.degree.levelDoctor of Philosophy Ph.D.en_US
dc.description.abstractMetamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware writers change the obfuscations (syntax) more than the behavior (semantic) of such a new malware. On this assumption and motivation, this thesis presents a new framework named MARD for Metamorphic Malware Analysis and Real-Time Detection. We also introduce a new intermediate language named MAIL (Malware Analysis Intermediate Language). Each MAIL statement is assigned a pattern that can be used to annotate a control flow graph for pattern matching to analyse and detect metamorphic malware. MARD uses MAIL to achieve platform independence, automation and optimizations for metamorphic malware analysis and detection. As part of the new framework, to build a behavioral signature and detect metamorphic malware in real-time, we propose two novel techniques, named ACFG (Annotated Control Flow Graph) and SWOD-CFWeight (Sliding Window of Difference and Control Flow Weight). Unlike other techniques, ACFG provides a faster matching of CFGs, without compromising detection accuracy; it can handle malware with smaller CFGs, and contains more information and hence provides more accuracy than a CFG. SWOD-CFWeight mitigates and addresses key issues in current techniques, related to the change of the frequencies of opcodes, such as the use of different compilers, compiler optimizations, operating systems and obfuscations. The size of SWOD can change, which gives anti-malware tool developers the ability to select appropriate parameter values to further optimize malware detection. CFWeight captures the control flow semantics of a program to an extent that helps detect metamorphic malware in real-time. Experimental evaluation of the two proposed techniques, using an existing dataset, achieved detection rates in the range 94% - 99.6% and false positive rates in the range 0.93% - 12.44%. Compared to ACFG, SWOD-CFWeight significantly improves the detection time, and is suitable to be used where the time for malware detection is more important as in real-time (practical) anti-malware applications.en_US
dc.description.proquestcode0984en_US
dc.description.proquestemailalam_shahid@yahoo.comen_US
dc.description.scholarlevelGraduateen_US
dc.identifier.bibliographicCitationShahid Alam, Ibrahim Sogukpinar, Issa Traore and R. Nigel Horspool. Sliding Window and Control Flow Weight for Metamorphic Malware Detection. Springer Journal of Computer Virology and Hacking Techniques, http://dx.doi.org/10.1007/s11416-014-0222-y.en_US
dc.identifier.bibliographicCitationShahid Alam, Ibrahim Sogukpinar, Issa Traore and Yvonne Coady. In-Cloud Malware Anlaysis and Detection: State of the Art. The Seventh ACM International Conference on Security of Information and Networks (SIN 2014), September, 2014. Glasgow, UK (in print).en_US
dc.identifier.bibliographicCitationShahid Alam, Issa Traore and Ibrahim Sogukpinar. Current Trends and the Future of Metamorphic Malware Detection. The Seventh ACM International Conference on Security of Information and Networks (SIN 2014), September, 2014. Glasgow, UK (in print).en_US
dc.identifier.bibliographicCitationShahid Alam, R. Nigel Horspool and Issa Traore. MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection. In Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, Research Track - Security and Privacy, May, 2014. Washington DC, USA, IEEE Computer Society.en_US
dc.identifier.bibliographicCitationShahid Alam, R. Nigel Horspool and Issa Traore. MAIL: Malware Analysis Intermediate Language - A Step Towards Automating and Optimizing Malware Detection. In Proceedings of the Sixth ACM International Conference on Security of Information and Networks, November, 2013. New York, USA, ACM SIGSAC.en_US
dc.identifier.urihttp://hdl.handle.net/1828/5576
dc.languageEnglisheng
dc.language.isoenen_US
dc.rights.tempAvailable to the World Wide Weben_US
dc.subjectEnd point securityen_US
dc.subjectMalware detectionen_US
dc.subjectMetamorphic malwareen_US
dc.subjectControl flow analysisen_US
dc.subjectHeuristicsen_US
dc.subjectData miningen_US
dc.subjectWindow of differenceen_US
dc.titleA Framework for Metamorphic Malware Analysis and Real-Time Detectionen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Alam_Shahid_PhD_2014.pdf
Size:
1.25 MB
Format:
Adobe Portable Document Format
Description:
PhD Thesis
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.74 KB
Format:
Item-specific license agreed upon to submission
Description: