iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-981-10-3153-3_55
A Framework for Dynamic Malware Analysis Based on Behavior Artifacts | SpringerLink
Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 515))

  • 1350 Accesses

Abstract

Malware stands for malicious software. Any file that causes damage to the computer or network can be termed as malicious. For malware analysis, there are two fundamental approaches: static analysis and dynamic analysis. The static analysis focuses on analyzing the file without executing, whereas dynamic analysis means analyzing or observing its behavior while it is being executed. While performing malware analysis, we have to classify malware samples. The different types of malware include worm, virus, rootkit, trojan horse, back door, botnet, ransomware, spyware, adware, and logic bombs. In this paper, our objective is to have a breakdown of techniques used for malware analysis and a comparative study of various malware detection/classification systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sikorski, Michael, and Andrew Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, 2012.

    Google Scholar 

  2. Egele, Manuel, et al. “A survey on automated dynamic malware-analysis techniques and tools.” ACM Computing Surveys (CSUR) 44.2 (2012): 6.

    Google Scholar 

  3. Mohaisen, Aziz, Omar Alrawi, and Manar Mohaisen. “Amal: High-fidelity, behavior-based automated malware analysis and classification.” Computers & Security (2015).

    Google Scholar 

  4. Malware tips, https://malwaretips.com.

  5. Pirscoveanu, Radu S., et al. “Analysis of Malware behavior: Type classification using machine learning.” Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015 International Conference on. IEEE, 2015.

    Google Scholar 

  6. Shijo, P. V., and A. Salim. “Integrated Static and Dynamic Analysis for Malware Detection.” Procedia Computer Science 46 (2015): 804–811.

    Google Scholar 

  7. Naval, Smita, et al. “Employing Program Semantics for Malware Detection.” Information Forensics and Security, IEEE Transactions on 10.12 (2015): 2591–2604.

    Google Scholar 

  8. University of Waikato, http://www.cs.waikato.ac.nz.

  9. Kawaguchi, Naoto, and Kazumasa Omote. “Malware Function Classification Using APIs in Initial Behavior.” Information Security (AsiaJCIS), 2015 10th Asia Joint Conference on. IEEE, 2015.

    Google Scholar 

  10. Ozsoy, Meltem, et al. “Malware-aware processors: A framework for efficient online malware detection.” High Performance Computer Architecture (HPCA), 2015 IEEE 21st International Symposium on. IEEE, 2015.

    Google Scholar 

  11. Cuckoo Sandbox, http://www.cuckoosandbox.org.

  12. Jiang, Xuxian, Xinyuan Wang, and Dongyan Xu. “Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction.” Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. G. Gregory Paul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Gregory Paul, T.G., Gireesh Kumar, T. (2017). A Framework for Dynamic Malware Analysis Based on Behavior Artifacts. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_55

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_55

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics