• DocumentCode
    3660705
  • Title

    DaCoMM: Detection and Classification of Metamorphic Malware

  • Author

    Vishakha Mehra;Vinesh Jain;Dolly Uppal

  • Author_Institution
    Rajasthan Tech. Univ., Kota, India
  • fYear
    2015
  • fDate
    4/1/2015 12:00:00 AM
  • Firstpage
    668
  • Lastpage
    673
  • Abstract
    With the fast and vast upliftment of IT sector in 21st century, the question for system security also accounts. As on one side, the IT field is growing with positivity, malware attacks are also arising on the other. Hence, a great challenge for zero day malware attack. Also, malware authors of metamorphic malware and polymorphic malware gain and extra advantage through mutation engine and virus generation toolkits as they can produce as many malware as they want. Our approach focuses on detection and classification of metamorphic malware. MM are hardest to detect by Antivirus Scanners because they differ structurally. We had gathered a total of 600 malware including those also that bypasses the AVS and 150 benign files. These files are disassembled, preprocessed, control flow graphs and API call graphs are generated. We had proposed an algorithm-Gourmand Feature Selection algorithm for selecting desired features from call graphs. Classification is done through WEKA tool, for which J-48 has given the most accuracy of 99.10%. Once the metamorphic malware are detected, they are classified according to their families using the histograms and Chi-square distance formula.
  • Keywords
    "Malware","Engines","Histograms","Classification algorithms","Flow graphs","Software","Generators"
  • Publisher
    ieee
  • Conference_Titel
    Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on
  • Type

    conf

  • DOI
    10.1109/CSNT.2015.62
  • Filename
    7280002