DocumentCode :
639723
Title :
A survey on heuristic malware detection techniques
Author :
Bazrafshan, Zahra ; Hashemi, Hossein ; Fard, Seyed Mehdi Hazrati ; Hamzeh, Ali
Author_Institution :
Dept. of Comput. Sci. & Eng., Shiraz Univ., Shiraz, Iran
fYear :
2013
fDate :
28-30 May 2013
Firstpage :
113
Lastpage :
120
Abstract :
Malware is a malicious code which is developed to harm a computer or network. The number of malwares is growing so fast and this amount of growth makes the computer security researchers invent new methods to protect computers and networks. There are three main methods used to malware detection: Signature based, Behavioral based and Heuristic ones. Signature based malware detection is the most common method used by commercial antiviruses but it can be used in the cases which are completely known and documented. Behavioral malware detection was introduced to cover deficiencies of signature based method. However, because of some shortcomings, the heuristic methods have been introduced. In this paper, we discuss the state of the art heuristic malware detection methods and briefly overview various features used in these methods such as API Calls, OpCodes, N-Grams etc. and discuss their advantages and disadvantages.
Keywords :
computer network security; invasive software; API calls; N-grams; OpCodes; behavioral based malware detection; computer protection method; computer security; heuristic malware detection techniques; signature based malware detection; Algorithms; Computers; Encryption; Feature extraction; Flow graphs; Malware; API Call; Computer Security; Control Flow Graph; Malware Detection; N-Gram; OpCode;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Knowledge Technology (IKT), 2013 5th Conference on
Conference_Location :
Shiraz
Print_ISBN :
978-1-4673-6489-8
Type :
conf
DOI :
10.1109/IKT.2013.6620049
Filename :
6620049
Link To Document :
بازگشت