A Framework for Metamorphic Malware Analysis and Real-Time Detection

Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware writers change the obfuscations (syntax) more than the behavior (semantic) of such...

Full description

Bibliographic Details
Main Author: Alam, Shahid
Other Authors: Horspool, R. Nigel
Language:English
en
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/1828/5576
Shahid Alam, Ibrahim Sogukpinar, Issa Traore and R. Nigel Horspool. Sliding Window and Control Flow Weight for Metamorphic Malware Detection. Springer Journal of Computer Virology and Hacking Techniques, http://dx.doi.org/10.1007/s11416-014-0222-y.
id ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-5576
record_format oai_dc
spelling ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-55762015-01-29T16:52:37Z A Framework for Metamorphic Malware Analysis and Real-Time Detection Alam, Shahid Horspool, R. Nigel Traore, Issa End point security Malware detection Metamorphic malware Control flow analysis Heuristics Data mining Window of difference Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware writers change the obfuscations (syntax) more than the behavior (semantic) of such a new malware. On this assumption and motivation, this thesis presents a new framework named MARD for Metamorphic Malware Analysis and Real-Time Detection. We also introduce a new intermediate language named MAIL (Malware Analysis Intermediate Language). Each MAIL statement is assigned a pattern that can be used to annotate a control flow graph for pattern matching to analyse and detect metamorphic malware. MARD uses MAIL to achieve platform independence, automation and optimizations for metamorphic malware analysis and detection. As part of the new framework, to build a behavioral signature and detect metamorphic malware in real-time, we propose two novel techniques, named ACFG (Annotated Control Flow Graph) and SWOD-CFWeight (Sliding Window of Difference and Control Flow Weight). Unlike other techniques, ACFG provides a faster matching of CFGs, without compromising detection accuracy; it can handle malware with smaller CFGs, and contains more information and hence provides more accuracy than a CFG. SWOD-CFWeight mitigates and addresses key issues in current techniques, related to the change of the frequencies of opcodes, such as the use of different compilers, compiler optimizations, operating systems and obfuscations. The size of SWOD can change, which gives anti-malware tool developers the ability to select appropriate parameter values to further optimize malware detection. CFWeight captures the control flow semantics of a program to an extent that helps detect metamorphic malware in real-time. Experimental evaluation of the two proposed techniques, using an existing dataset, achieved detection rates in the range 94% - 99.6% and false positive rates in the range 0.93% - 12.44%. Compared to ACFG, SWOD-CFWeight significantly improves the detection time, and is suitable to be used where the time for malware detection is more important as in real-time (practical) anti-malware applications. Graduate 0984 alam_shahid@yahoo.com 2014-08-19T20:08:41Z 2014-08-19T20:08:41Z 2014 2014-08-19 Thesis http://hdl.handle.net/1828/5576 Shahid Alam, Ibrahim Sogukpinar, Issa Traore and R. Nigel Horspool. Sliding Window and Control Flow Weight for Metamorphic Malware Detection. Springer Journal of Computer Virology and Hacking Techniques, http://dx.doi.org/10.1007/s11416-014-0222-y. Shahid Alam, Ibrahim Sogukpinar, Issa Traore and Yvonne Coady. In-Cloud Malware Anlaysis and Detection: State of the Art. The Seventh ACM International Conference on Security of Information and Networks (SIN 2014), September, 2014. Glasgow, UK (in print). Shahid Alam, Issa Traore and Ibrahim Sogukpinar. Current Trends and the Future of Metamorphic Malware Detection. The Seventh ACM International Conference on Security of Information and Networks (SIN 2014), September, 2014. Glasgow, UK (in print). Shahid Alam, R. Nigel Horspool and Issa Traore. MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection. In Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, Research Track - Security and Privacy, May, 2014. Washington DC, USA, IEEE Computer Society. Shahid Alam, R. Nigel Horspool and Issa Traore. MAIL: Malware Analysis Intermediate Language - A Step Towards Automating and Optimizing Malware Detection. In Proceedings of the Sixth ACM International Conference on Security of Information and Networks, November, 2013. New York, USA, ACM SIGSAC. English en Available to the World Wide Web
collection NDLTD
language English
en
sources NDLTD
topic End point security
Malware detection
Metamorphic malware
Control flow analysis
Heuristics
Data mining
Window of difference
spellingShingle End point security
Malware detection
Metamorphic malware
Control flow analysis
Heuristics
Data mining
Window of difference
Alam, Shahid
A Framework for Metamorphic Malware Analysis and Real-Time Detection
description Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general malware writers reuse old malware. To hide detection the malware writers change the obfuscations (syntax) more than the behavior (semantic) of such a new malware. On this assumption and motivation, this thesis presents a new framework named MARD for Metamorphic Malware Analysis and Real-Time Detection. We also introduce a new intermediate language named MAIL (Malware Analysis Intermediate Language). Each MAIL statement is assigned a pattern that can be used to annotate a control flow graph for pattern matching to analyse and detect metamorphic malware. MARD uses MAIL to achieve platform independence, automation and optimizations for metamorphic malware analysis and detection. As part of the new framework, to build a behavioral signature and detect metamorphic malware in real-time, we propose two novel techniques, named ACFG (Annotated Control Flow Graph) and SWOD-CFWeight (Sliding Window of Difference and Control Flow Weight). Unlike other techniques, ACFG provides a faster matching of CFGs, without compromising detection accuracy; it can handle malware with smaller CFGs, and contains more information and hence provides more accuracy than a CFG. SWOD-CFWeight mitigates and addresses key issues in current techniques, related to the change of the frequencies of opcodes, such as the use of different compilers, compiler optimizations, operating systems and obfuscations. The size of SWOD can change, which gives anti-malware tool developers the ability to select appropriate parameter values to further optimize malware detection. CFWeight captures the control flow semantics of a program to an extent that helps detect metamorphic malware in real-time. Experimental evaluation of the two proposed techniques, using an existing dataset, achieved detection rates in the range 94% - 99.6% and false positive rates in the range 0.93% - 12.44%. Compared to ACFG, SWOD-CFWeight significantly improves the detection time, and is suitable to be used where the time for malware detection is more important as in real-time (practical) anti-malware applications. === Graduate === 0984 === alam_shahid@yahoo.com
author2 Horspool, R. Nigel
author_facet Horspool, R. Nigel
Alam, Shahid
author Alam, Shahid
author_sort Alam, Shahid
title A Framework for Metamorphic Malware Analysis and Real-Time Detection
title_short A Framework for Metamorphic Malware Analysis and Real-Time Detection
title_full A Framework for Metamorphic Malware Analysis and Real-Time Detection
title_fullStr A Framework for Metamorphic Malware Analysis and Real-Time Detection
title_full_unstemmed A Framework for Metamorphic Malware Analysis and Real-Time Detection
title_sort framework for metamorphic malware analysis and real-time detection
publishDate 2014
url http://hdl.handle.net/1828/5576
Shahid Alam, Ibrahim Sogukpinar, Issa Traore and R. Nigel Horspool. Sliding Window and Control Flow Weight for Metamorphic Malware Detection. Springer Journal of Computer Virology and Hacking Techniques, http://dx.doi.org/10.1007/s11416-014-0222-y.
work_keys_str_mv AT alamshahid aframeworkformetamorphicmalwareanalysisandrealtimedetection
AT alamshahid frameworkformetamorphicmalwareanalysisandrealtimedetection
_version_ 1716729706000154624