• DocumentCode
    2969117
  • Title

    Intelligent automatic malicious code signatures extraction

  • Author

    Deng, Peter Shaohua ; Wang, Jau-Hwang ; Shieh, Wen-Gong ; Yen, Chih-Pin ; Tung, Cheng-Tan

  • Author_Institution
    Dept. of Inf. Manage., Central Police Univ., Taoyuan, Taiwan
  • fYear
    2003
  • fDate
    14-16 Oct. 2003
  • Firstpage
    600
  • Lastpage
    603
  • Abstract
    The computer malicious executable code has been with us for a quite long time. Since computer hardware and Internet is growing so fast today, security threats of malicious executable code are getting more serious. Basically, malicious executable codes are categorized into three kinds. The first is called virus, which always infect other benign programs. The second is called Trojan which always masquerade its malicious executable code inside a usefully utility or freeware program. And the last but not the least is called worm that replicate and distribute itself automatically around the network. According to the literature survey [R.A. Grimes (2001)], current antivirus products cannot detect all the malicious codes, especially for those unseen, polymorphism malicious executable codes. Moreover, there are many virus program generators and mutation engines available on public Web sites that can be downloaded freely make a lot of unseen, polymorphism, and harmful executable malicious code. So how to extract virus signatures efficiently and effectively automatically instead of manually for an antivirus scanner system is quite important and also is the major purpose of this research.
  • Keywords
    authorisation; computer crime; computer viruses; distributed programming; message authentication; Trojan virus; antivirus scanner system; computer virus; intelligent automatic malicious code; mutation engine; signature extraction; virus program generator; Automatic programming; Computer security; Computer worms; Data mining; Genetic mutations; Hardware; Humans; Information management; Internet; Search engines;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on
  • Print_ISBN
    0-7803-7882-2
  • Type

    conf

  • DOI
    10.1109/CCST.2003.1297626
  • Filename
    1297626