Malware Detection based on Dependency Graph using Hybrid Genetic Algorithm
#1

Malware Detection based on Dependency Graph using Hybrid Genetic Algorithm
B.Tech Seminar report
by
Jishnu V
Department of Computer Science And Engineering
Government Engineering College, Thrissur
December 2010

[attachment=7712]

Abstract
Computer malwares are becoming a serious threat to our data and information stored
in our computers. Among them, scripted malwares are gaining popularity since script-
ing is supported by a wide range of programs. So their detection and prevention is very
important. Most malware detection tools follow signature based detection mechanism.
But by the introduction of polymorphic variants of malwares, signature based detec-
tion has become inecient. This paper proposes a mechanism based on dependency
graphs for detecting script malwares. All malwares are represented by dependency
graphs and the detection is done by nding the maximum subgraph isomorphism with
the dependency graph of the target le. Since the problem of nding maxumum sub-
graph isomorphism is a NP hard problem, a genetic algorithm is more appropriate.
A heuristic approach is also presented to improve accuracy and reduce computational
cost of our genetic algorithm.

Chapter 1
Introduction

Malicious softwares or malwares are a broad class of softwares that are threats to
computer systems. They damages the computer systems, destroys or steals data, or
allows unauthorized access. According to thier behaviour malwares can be grouped
as viruses, spywares, adwares or trojan horses.
Scripted malwares are those that written in script languages like VBscript,
javascript etc.. These are spread in the form of sources embedded in emails or docu-
ments.
Signature based detection is the most common method followed for malware
detection. The malware detection tools have the siganture of most malwares in their
database. Signature can be considered to be a piece of code that uniquely identi es
that malware. The suspicious le is searched for a known signature. If the signature
matches with one in the database the le is declared as malware, else benign.
Malware polymorphism is the main threat to the signature based detection
technique. But it only changes the appearance of the malware. The dependencies
among statements will be still valid. The structure of the dependency graph of the
code will remain same even after alteration of statements. So our problem reduces to
nding the maximum subgraph isomorphism between the graphs. A genetic algorithm
with heuristics is used since nding maximum subgraph isomorphism is a NP hard
problem.

Chapter 2
Malware Polymorphism

Many techniques have evolved over time to avoid detection of anti-virus softwares.
The most prominent among them is malware polymorphism. This method is the main
threat to the signature based detection.
Polymorphic viruses confuse the virus detectors by changing their appearance.
Even if they change their appearance, their function will not change. The algorithm
of the original code remains intact. Commonly, 7 well-known techniques are used for
creating polymorphic variants. Even with these 7 techniques only, it is possible to
create a large number of variants of a single virus. Some even have a mutation engine
which creates a random variant each time it infects a new program.
2.1 7 well-known Polymorphic Techniques
The di erent polymorphic variants of the code shown in Figure 2.1(a) are shown
in Figure 2.1(b)-2.1(h). The di erent techniques are described below:
2.1.1 Variable Renaming
Identi er names are changed by keeping the correctness of the program. It is the
weakest form of polymorphism.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: discovering conditional functional dependency ppt, matlab graph cut algorithm code, variants, genetic algorithm based train simulation using concurrent engineering, a project topic on functional dependency, existing intrusion detection system using genetic algorithm project, seminar report on detection of mobile malware in the wild,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  APRIORI Algorithm project report helper 1 10,963 07-02-2019, 10:19 AM
Last Post:
  OBJECT TRACKING AND DETECTION full report project topics 9 30,914 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 30,480 07-10-2016, 09:02 AM
Last Post: ijasti
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,386 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,842 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,097 15-04-2016, 08:04 PM
Last Post: knagpur
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,823 14-07-2015, 02:24 PM
Last Post: seminar report asees
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,349 22-07-2013, 11:44 AM
Last Post: computer topic
  Particle Swarm Optimization Algorithm and Its Application in Engineering Design Optim computer science crazy 3 5,490 03-05-2013, 10:28 AM
Last Post: computer topic

Forum Jump: