A Survey on Malware Attacks Analysis and Detected

Abstract

Malware is one of the biggest problems modern internet users face. Private data and pricey computing resources are seriously threatened by the rise in malware attacks. Anti-malware businesses rely on signatures, which do in fact involve regular expressions and strings, to find malware and its related families. Recent malware attacks in recent years have demonstrated that signature-based techniques are error-prone and easily avoided by sophisticated malware programs. This essay provides an introductory overview of malware and analysis techniques used, as well as detection techniques used by researchers.

Country : Iraq

1 Naz faith M Jameel2 Muna M. T. Jawhar

  1. Software Department, College of Computer Sciences and Mathematics, University of Mosul, Mosul, Iraq
  2. Software Department, College of Computer Sciences and Mathematics, University of Mosul, Mosul, Iraq

IRJIET, Volume 7, Issue 5, May 2023 pp. 32-40

doi.org/10.47001/IRJIET/2023.705005

References

  1. Saja Abu-Zaideh, Mohammad Abu Snober and Qasem Abu Al-Haija. “Smart Boosted Model for Behavior-Based Malware Analysis and Detection”.
  2. Mozammel Chowdhury(&), Azizur Rahman, and Rafiqul Islam, Malware Analysis and Detection Using Data Mining and Machine Learning Classification.
  3. Tian, R., Islam, R., Batten, L., Versteeg, S.: Differentiating malware from clean ware using behavior al analysis. In: International Conference on Malicious and Unwanted Software: MALWARE 2010, pp. 23–30 (2010).
  4. Dinh Viet Sang, Dang ManhCuong, Le Tran BaoCuong. “An Effective Ensemble Deep Learning Framework for Malware Detection”, Conference Paper • December 2018. SoICT 2018, December 6–7, 2018, Danang City, Viet Nam.  DOI: 10.1145/3287921.3287971.
  5. Manuel Egele, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. 2012. A survey on automated dynamic malware-analysis techniques and tools. ACM computing surveys (CSUR) 44, 2 (2012).
  6. Vidyarthi, D., Kumar, C. R. S., Rakshit, S., & Chansarkar, S. (2019). Static malware analysis to identify ransom ware properties. International Journal of Computer Science Issues (IJCSI), 16(3), 10-17, DOI:10.5281/zenodo.3252963.
  7. Shijo, P. V., & Salim, A. J. P. C. S. (2015). Integrated static and dynamic analysis for malware detection. Procedia Computer Science, 46, 804-811.‏https://doi.org/10.1016/j.procs.2015.02.149.
  8. Yunus, Y. K. B. M., &Ngah, S. B. (2020, February). Review of hybrid analysis technique for malware detection. In IOP conference series: materials science and engineering (Vol. 769, No. 1, p. 012075). IOP Publishing.‏ DOI 10.1088/1757-899X/769/1/012075.
  9. Talukder, S. (2020). Tools and techniques for malware detection and analysis. arXiv preprint arXiv:2002.06819.
  10. Damodaran, A., Troia, F. D., Visaggio, C. A., Austin, T. H., & Stamp, M. (2017). A comparison of static, dynamic, and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques, 13, 1-12.‏ DOIhttps://doi.org/10.1007/s11416-015-0261-z.
  11. Han, W., Xue, J., Wang, Y., Huang, L., Kong, Z., & Mao, L. (2019). MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. & security, 83, 208-233.‏https://doi.org/10.1016/j.cose.2019.02.007.
  12. Fleshman, W., Raff, E., Zak, R., McLean, M., & Nicholas, C. (2018, October). Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus. In 2018 13th International Conference on Malicious and Unwanted Software (MALWARE) (pp. 1-10). IEEE.‏DOI: 10.1109/MALWARE.2018.8659360.
  13. Rami Sihwail, Khairuddin Omar, K. A. Z. Ariffin. “A Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis“. International Journal on Advanced Science Engineering and Information Technology, September 2018. DOI: 10.18517/ijaseit.8.4-2.6827.
  14. D. Ucci, L. Aniello, and R. Baldoni, “Survey on the Usage of Machine Learning Techniques for Malware Analysis,” arXiv Prepr.arXiv1710.08189, pp. 1–67, 2018.https://doi.org/10.1016/j.cose.2018.11.001.
  15. E. Gandotra, D. Bansal, and S. Sofat, “Malware Analysis and Classification: A Survey,” J. Inf. Secur., vol. 05, no. 02, pp. 56–64, 2014.DOI:10.4236/jis.2014.52006.
  16. Abou-Assaleh, T., Cercone, N., Keselj, V., & Sweidan, R. (2004, September). N-gram-based detection of new malicious code. In Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004. (Vol. 2, pp. 41-42). IEEE.‏DOI: 10.1109/CMPSAC.2004.1342667.
  17. H. Hashemi and A. Hamzeh, “Visual malware detection using local malicious pattern,” Journal of Computer Virology and Hacking Techniques, pp. 1–14, 2018.
  18. Y. Cheng, W. Fan, W. Huang, and J. An, “A Shellcode Detection Method Based on Full Native API Sequence and Support Vector Machine,” in IOP Conference Series: Materials Science and Engineering, 2017, vol. 242, no. 1, pp. 1–7.DOI 10.1088/1757-899X/242/1/012124.
  19. H. S. Galal, Y. B. Mahdy, and M. A. Atiea, “Behavior-based features model for malware detection,” J. Comput. Virol. Hacking Tech., vol. 12, no. 2, pp. 59–67, 2016.
  20. Y. Ki, E. Kim, and H. K. Kim, “A novel approach to detect malware based on API call sequence analysis,” Int. J. Distrib. Sens. Networks, vol. 2015, no. 6: 659101, pp. 1–9, 2015.
  21. C.-I. Fan, H.-W. Hsiao, C.-H. Chou, and Y.-F. Tseng, “Malware Detection Systems Based on API Log Data Mining,” in 2015 IEEE 39th Annual Computer Software and Applications Conference, 2015, pp. 255–260.
  22. M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A survey on automated dynamic malware-analysis techniques and tools,” ACM Comput. Surv., vol. 44, no. 2, pp. 1–42, 2012.
  23. M. Sikorski and A. Honig, Practical malware analysis: the hands-on guide to dissecting malicious software. No starch press. 2012.
  24. Chen, X., Andersen, J., Mao, Z. M., Bailey, M., &Nazario, J. (2008, June). Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In 2008 IEEE international conference on dependable systems and networks with FTCS and DCC (DSN) (pp. 177-186). IEEE.‏DOI: 10.1109/DSN.2008.4630086.
  25. M. Eskandari, Z. Khorshidpour, and S. Hashemi, “HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection,” J. Comput. Virol. Hacking Tech., vol. 9, no. 2, pp. 77–93, 2013.DOIhttps://doi.org/10.1007/s11416-013-0181-8.
  26. Faruk, M. J. H., Shahriar, H., Valero, M., Barsha, F. L., Sobhan, S., Khan, M. A., & Wu, F. (2021, December). Malware detection and prevention using artificial intelligence techniques. In 2021 IEEE International.‏
  27. Fettaya, R., & Mansour, Y. (2020). Detecting malicious PDF using CNN. arXiv preprint arXiv:2007.12729. ‏ N, https://doi.org/10.48550/arXiv.2007.12729.
  28. Al-Haija, Q. A., Odeh, A., &Qattous, H. (2022). PDF Malware Detection Based on Optimizable Decision Trees. ‏doi: 10.20944/preprints202209.0103.v1
  29. Deore, M., &Kulkarni, U. (2022). Mdfrcnn: Malware detection using faster region proposals convolution neural network.‏ International Journal of Interactive Multimedia and Artificial Intelligence, Vol. 7, No 4, DOI: https://doi.org/10.9781/ijimai.2021.09.005.
  30. Akhtar, M. S., & Feng, T. (2022). Malware Analysis and Detection Using Machine Learning Algorithms. Symmetry, 14(11), 2304.‏ School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China. https://doi.org/10.3390/sym14112304.
  31. Singh, H. K., Singh, J. P., & Tewari, A. S. (2022). Static Malware Analysis Using Machine and Deep Learning. In Proceedings of International Conference on Computing and Communication Networks (pp. 437-446). Springer, Singapore.‏ DOI:10.1007/978-981-19-0604-6_41.
  32. Buradkar, M. U., Anajani, P. K., Reddaiah, B., Madduri, A., Thakkar, D., Bobade, S. D., &Subbulaks Tools and techniques for malware detection and analysis. arXiv preprint arXiv:2002.06819.hmi, T. (2022). Static Malware Analysis Using Optimal Machine Learning Algorithm for Malware Detection. Neuro Quantology, 20(10), 4128-4141.‏
  33. Chowdhury, M., Rahman, A., & Islam, R. (2017, June). Malware analysis and detection using data mining and machine learning classification. In International conference on applications and techniques in cyber security and intelligence (pp. 266-274). Edizionidella Normale, Cham.DOI: 10.1007/978-3-319-67071-3_33.
  34. Karbab, E. B., & Debbabi, M. (2019). MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports. Digital Investigation, 28, S77-S87 DOI:10.1016/j.diin.2019.01.017.‏
  35. Zhang, J. (2018). MLPdf: an effective machine learning based approach for PDF malware detection. arXiv preprint arXiv:1808.06991., https://doi.org/10.48550/arXiv.1808.0699.
  36. Abdelsalam, M., Krishnan, R., Huang, Y., &Sandhu, R. (2018, July). Malware detection in cloud infrastructures using convolutional neural networks. In 2018 IEEE 11th International conference on cloud computing (CLOUD) (pp. 162-169). IEEE.‏DOI: 10.1109/CLOUD.2018.00028.
  37. Kakavand, M., Dabbagh, M., &Dehghantanha, A. (2018, November). Application of machine learning algorithms for android malware detection. In Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems (pp. 32-36).‏https://doi.org/10.1145/3293475.3293489.
  38. Azmoodeh, A., Dehghantanha, A., &Choo, K. K. R. (2018). Robust malware detection for internet of (battlefield) things devices using deep eigen space learning. IEEE transactions on sustainable computing, 4(1), 88-95.‏
  39. Shah, S. S. H., Jamil, N., & Khan, A. U. R. (2022). Memory Visualization-Based Malware Detection Technique. Sensors, 22(19), 7611, ‏https://doi.org/10.3390/s22197611.
  40. A.Moser, C. Kruegel, and E. Kirda, “Limits of static analysis for malware detection,” in Proceedings - Annual Computer Security Applications Conference, ACSAC, 2007, pp. 421–430.
  41. J. Okolica and G. Peterson, “A compiled memory analysis tool,” in IFIP Advances in Information and Communication Technology, 2010, vol. 337 AICT, pp. 195–204.https://hal.inria.fr/hal-01060619.
  42. Atluri, A. C., & Tran, V. (2017). Botnets threat analysis and detection. Information Security Practices: Emerging Threats and Perspectives, 7-28.‏DOI: 10.1007/978-3-319-48947-6_2.
  43. Endgame, “Ember,” 2018. [Online]. Available: https://www.endgame.com/blog/technical-blog/introducing-emberopen-source-classifier-and-dataset.