Skip to main navigation Skip to search Skip to main content

Performance evaluation of string based malware detection methods

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

Conventional signature-based malware detection techniques have been used for many years because of their high detection rates and low false positive rates. However, signature-based detection techniques are regarded as ineffective due to their inability to detect unseen, new, polymorphic and metamorphic malware. To affect the weaknesses of the signature-based detection techniques, researchers have turned into behavioural-based detection techniques whereby a malware behavioural is constructed by capturing malware API calls during execution. In this context, API call sequences matching techniques are widely used to compute malware similarities. However, API call sequences matching techniques require large processing resources which make the process slow due to computational complexity and therefore, cannot scale to large API call sequences. To mitigate its problem, Longest Common Substring and Longest Common Subsequence have been used in this paper for strings matching in order to detect malware and their variants. In this paper we evaluate these two algorithms in the context of malware detection rate and false alarm rate.
Original languageEnglish
Title of host publicationnan
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781862203426
DOIs
Publication statusPublished - 1 Jul 2019
Event24th International Conference on Automation and Computing (ICAC) - Newcastle upon Tyne
Duration: 6 Sept 20187 Sept 2018

Conference

Conference24th International Conference on Automation and Computing (ICAC)
CityNewcastle upon Tyne
Period6/09/187/09/18
Other24th International Conference on Automation and Computing (ICAC) (06/09/2018-07/09/2018, Newcastle upon Tyne)

Keywords

  • Malware detection

Fingerprint

Dive into the research topics of 'Performance evaluation of string based malware detection methods'. Together they form a unique fingerprint.

Cite this