Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.1.085

A Study on Similarity Comparison for File DNA-Based Metamorphic Malware Detection  

Jang, Eun-Gyeom (Dept. of Computer Science, Daejeon University)
Lee, Sang Jun (Dept. of Integrated Environment Systems, Pyeongtaek University)
Lee, Joong In (Real Time Tech. Co., Ltd.)
Abstract
This paper studied the detection technique using file DNA-based behavior pattern analysis in order to minimize damage to user system by malicious programs before signature or security patch is released. The file DNA-based detection technique was applied to defend against zero day attack and to minimize false detection, by remedying weaknesses of the conventional network-based packet detection technique and process-based detection technique. For the file DNA-based detection technique, abnormal behaviors of malware were splitted into network-related behaviors and process-related behaviors. This technique was employed to check and block crucial behaviors of process and network behaviors operating in user system, according to the fixed conditions, to analyze the similarity of behavior patterns of malware, based on the file DNA which process behaviors and network behaviors are mixed, and to deal with it rapidly through hazard warning and cut-off.
Keywords
Behavior-Based; Similarity; DNA; Malware;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Sung, J. Xu, P. Chavez and S. Mukkamala, "Static Analyzer for Vicious Executable(SAVE)", 20th Annual Computer Security Application Conference, pp. 326-334, 2004.
2 Alex Ship, "Heuristic Detection of Viruses within E-mail"m Virus Bulletin Paper, 2001.
3 Baudorin Le Charlier, Morton Swimmer, Abdelaziz Mounji, "Dynamic detection and classification of computer viruses using general behavior patterns", th International Virus Bulletin Conference. Boston, September pp. 20-22, 1995.
4 John Aycock, "Computer Viruses and Mallware", 2006.
5 Matthew Evan Wagner, "Behavior Oriented Detection of Malicious Code at Run-Time", F.I.T Pater, 2004.
6 Matthew M. Williamson, "Using Behavior to Detect and Classification Information-Stealing Malware", 2005.
7 Nam-Youl Park, Yong-Min Kim, Bong-Nam Noh, "A Behavior based Detection for Malicious Code Using Obfuscation Technique", KIISC, Vol. 16, No. 3, June. 2006.
8 Eun-Gyeom Jang, "A Study on Comparison of Road Surface Images to Provide Information on Specific Road Conditions", KSCI, Vol. 17. No. 4, April. 2012.