Malware concealment is the predominant strategy for malware propagation. Black hats create variants of malware based on polymorphism and metamorphism. Malware variants, by definition, share some information. Although the concealment strategy alters this information, there are still patterns on the software. Given a zoo of labelled malware and benign-ware, we ask whether a suspect program is more similar to our malware or to our benign-ware. Normalized Compression Distance (NCD) is a generic metric that measures the shared information content of two strings. This measure opens a new front in the malware arms race, one where the countermeasures promise to be more costly for malware writers, who must now obfuscate patterns as strings qua strings, without reference to execution, in their variants. Our approach classifies disk-resident malware with 97.4% accuracy and a false positive rate of 3%. We demonstrate that its accuracy can be improved by combining NCD with the compressibility rates of executables using decision forests, paving the way for future improvements. We demonstrate that malware reported within a narrow time frame of a few days is more homogeneous than malware reported over two years, but that our method still classifies the latter with 95.2% accuracy and a 5% false positive rate. Due to its use of compression, the time and computation cost of our method is nontrivial. We show that simple approximation techniques can improve its running time by up to 63%. We compare our results to the results of applying the 59 anti-malware programs used on the VirusTotal website to our malware. Our approach outperforms each one used alone and matches that of all of them used collectively.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7517096 | PMC |
http://dx.doi.org/10.3390/e22050575 | DOI Listing |
Neural Netw
January 2025
Department of Electronic Engineering, Tsinghua University, Beijing, China. Electronic address:
Out-of-graph node representation learning aims at learning about newly arrived nodes for a dynamic graph. It has wide applications ranging from community detection, recommendation system to malware detection. Although existing methods can be adapted for out-of-graph node representation learning, real-world challenges such as fixed in-graph node embedding and data diversity essentially limit the performance of these methods.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.
This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Department of Computer Science, Al-Baha University, Al-Baha 65779, Saudi Arabia.
Android malware detection remains a critical issue for mobile security. Cybercriminals target Android since it is the most popular smartphone operating system (OS). Malware detection, analysis, and classification have become diverse research areas.
View Article and Find Full Text PDFPLoS One
January 2025
IT4Innovations, VSB - Technical University of Ostrava, Ostrava, Czech Republic.
Malware is a common word in modern era. Everyone using computer is aware of it. Some users have to face the problem known as Cyber crimes.
View Article and Find Full Text PDFSensors (Basel)
December 2024
School of Computer Engineering & Applied Mathematics, Hankyong National University, Anseong-si 17501, Republic of Korea.
In recent years, significant research has been directed towards the taxonomy of malware variants. Nevertheless, certain challenges persist, including the inadequate accuracy of sample classification within similar malware families, elevated false-negative rates, and significant processing time and resource consumption. Malware developers have effectively evaded signature-based detection methods.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!