Open Access Open Access  Restricted Access Subscription or Fee Access

A LITERATURE REVIEW OF INTELLIGENCE INTRUSION DETECTION PREVENTION TECHNIQUES FOR UNKNOWN MALWARE FINDING

S Murugan

Abstract


Intrusion detection system (IDS) has played a vital role as a device to guard our networks from unknown malware attacks. However, since it still suffers from detecting an unknown attack, the ultimate challenge in intrusion detection field is how we can precisely identify such an attack. For identifying known malware various tools are available but that does not detect Unknown malware exactly. It will vary according to connectivity and using tools and finding strategies what they used. Anyhow like known Malware few of unknown malware listed according to their abnormal activities and changes in the system. This paper will analyze the various unknown malware activities while networking, internet or remote connection.

Full Text:

PDF

References


REFERENCES

Anderson. B, Storlie.C and Lane.T, Improving Malware Classification: Bridging the Static/Dynamic Gap. Proceedings of 5th ACM Workshop on Security and Artificial Intelligence (AISec), 3-14, 2012.

Anderson. D, Lunt, H. Javitz, A. Tamaru and A. Valdes ,Safeguard Final Report: Detecting Unusual Program Behavior Using the NIDES Statistical Component, Computer Science Laboratory, SRI International, Menlo Park, CA, Technical Report,1993.

Bayer.U, Moser.A, Kruegel. C and Kirda.E, Dynamic Analysis of Malicious Code. Journal in Computer Virology, 2, 67-77, 2006.

Biley. M, Oberheid. J , Andersen. J, Morley Mao. Z, Jahanian.F and Nazario.J, Automated Classification and Analysis of Internet Malware. Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection, 4637, 178-197, 2007.

Firdausi.I, Lim.C and Erwin.A, Analysis of Machine Learning Techniques Used in Behavior Based Malware Detection. Proceedings of 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), Jakarta, 2-3 December 2010, 201-203, 2010.

Kolter .J and Maloof.M, Learning to Detect Malicious Executable in the Wild. Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 470-478, 2004.

Kong.D and Yan.G, Discriminant Malware Distance Learning on Structural Information for Automated Malware Classification. Proceedings of the ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems, 347-348, 2013.

Lee W. and Stolfo S. J. Data Mining approaches for intrusion detection, In Proc. Seventh USENIX Security Symposium, San Antonio, TX, 1998.

LeeW, Stolfo.S.J and Kwok K. W, Mining audit data to build intrusion detection models.In Proc. Fourth International Conference on Knowledge Discovery and Data Mining,NewYork, 1998.

Moser.A, Kruegel.C and Kirda.E, Exploring multiple execution paths for malware analysis. In Proceedings of the 2007 IEEE Symposium on Security and Privacy. IEEE,2007a.

Moser. A, Kruegel.C and Kirda. E , Limits of static analysis for malware detection. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC), 2007b.

Nataraj. L, Karthikeyan. S, Jacob.G and Manjunath. B, Malware Images: Visualization and Automatic Classification. Proceedings of the 8th International Symposium on Visualization for Cyber Security, Article No. 4, 2011.

Nataraj.L, Yegneswaran.V, Porras.P and Zhang. J, A Comparative Assessment of Malware Classification Using Binary Texture Analysis and Dynamic Analysis. Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 21-30, 2011.

Ning .P, Cui .Y, Reeves D. S, Constructing Attack Scenarios through Correlation of Intrusion Alerts, Proc. ACM Computer and Communications Security Conf., 2002.

Park.Y, Reeves.D, Mulukutla.V. and Sundaravel.B, Fast Malware Classification by Automated Behavioral Graph Matching. Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research, Article No. 45, 2010.

Rieck.K, Trinius. P, Willems, C and Holz.T, Automatic Analysis of Malware Behavior Using Machine Learning. Journal of Computer Security, 19, 639-668, 2011.

Santos, I., Devesa, J., Brezo, F., Nieves, J. and Bringas, P.G, OPEM: A Static-Dynamic Approach for Machine Learning Based Malware Detection. Proceedings of International Conference CISIS’12-ICEUTE’12, Special Sessions Advances in Intelligent Systems and Computing, 189, 271-280, 2013.

Santos.I, Nieves. J. and Bringas. P.G, Collective Classification for Unknown Malware Detection. Proceedings of the International Conference on Security and Cryptography, Seville, 18-21 July 2011, 251-256.

Schultz.M, Eskin.E, Zadok.E and Stolfo. S, Data Mining Methods for Detection of New Malicious Executables, Proceedings of the IEEE Symposium on Security and Privacy, 2001, pp. 178--184.

Siddiqui.M, Wang.M.C and Lee, J, Detecting Internet Worms Using Data Mining Techniques. Journal of Systemics, Cybernetics and Informatics, 6, 48-53, 2009.

Tian, R., Batten, L. and Versteeg, S, Function Length as a Tool for Malware Classification. Proceedings of the 3rd International Conference on Malicious and Unwanted Software, Fairfax, 7-8 October 2008, 57-64.

Zolkipli.M.F and Jantan.A, An Approach for Malware Behavior Identification and Classification. Proceeding of 3rd International Conference on Computer Research and Development, Shanghai, 11-13 March 2011, 191-194, 2011




DOI: https://doi.org/10.37628/jdcas.v1i2.80

Refbacks

  • There are currently no refbacks.