Skip to main content

Obfuscated Malware Detection: Impacts on Detection Methods

  • Conference paper
  • First Online:
Recent Challenges in Intelligent Information and Database Systems (ACIIDS 2023)

Abstract

Obfuscated malware poses a challenge to traditional malware detection methods as it uses various techniques to disguise its behavior and evade detection. This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. Furthermore, this paper discusses the current state of obfuscated malware, the methods used to detect it, and the limitations of those methods. The impact of obfuscation on the effectiveness of detection methods is also discussed. An approach for the creation of advanced detection techniques based on machine learning algorithms is offered, along with an empirical examination of malware detection performance assessment to battle obfuscated malware. Overall, this paper highlights the importance of staying ahead of the constantly evolving threat landscape to safeguard computer networks and systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tahir, R.: A study on malware and malware detection techniques. Int. J. Educ. Manage. Eng. 8(2), 20 (2018)

    Google Scholar 

  2. Gorment, N.Z., Selamat, A., Krejcar, O.: A recent research on malware detection using machine learning algorithm: current challenges and future works. In: Badioze Zaman, H., et al. (eds.) Advances in Visual Informatics, IVIC 2021, vol. 13051, pp. 469–481. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90235-3_41

    Chapter  Google Scholar 

  3. Khariwal, K., Singh, J., Arora, A.: IPDroid- android malware detection using intents and permissions. In: 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), pp. 197–202. IEEE (2020)

    Google Scholar 

  4. Coban, O., Ozel, S.A.: Adapting text categorization for manifest based android malware detection. Comput. Sci. 20(3), (2019)

    Google Scholar 

  5. Huda, S., et al.: Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inf. Sci. 379, 211–228 (2017)

    Article  Google Scholar 

  6. Hashemi, H., Azmoodeh, A., Hamzeh, A., Hashemi, S.: Graph embedding as a new approach for unknown malware detection. J. Comput. Virol. Hacking Tech. 13(3), 153–166 (2016). https://doi.org/10.1007/s11416-016-0278-y

    Article  Google Scholar 

  7. Ibrahim, W.N.H., et al.: Multilayer framework for botnet detection using machine learning algorithms. IEEE Access 9, 48753–48768 (2021)

    Article  Google Scholar 

  8. Alkhateeb, E.M., Stamp, M.: A dynamic heuristic method for detecting packed malware using naive Bayes. In: 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA), pp. 1–6. IEEE (2019)

    Google Scholar 

  9. Kumar, R., Zhang, X., Wang, W., Khan, R.U., Kumar, J., Sharif, A.: A multimodal malware detection technique for Android IoT devices using various features. IEEE Access 7, 64411–64430 (2019)

    Article  Google Scholar 

  10. Mishra, P., et al.: VMShield memory introspection-based malware detection to secure cloud-based services against stealthy attacks. IEEE Trans. Ind. Inf. (2021)

    Google Scholar 

  11. Mira, F., Huang, W., Brown, A.: Improving malware detection time by using RLE and N-gram. In: 23rd International Conference on Automation and Computing (ICAC), pp. 1–5. IEEE (2017)

    Google Scholar 

  12. Gorment, N.Z., Selamat, A., Cheng, L.K., Krejcar, O.: Machine learning algorithm for malware detection: taxonomy, current challenges and future directions. IEEE Access (2023)

    Google Scholar 

  13. Singh, J., Singh, J.: Challenge of malware analysis: malware obfuscation techniques. Int. J. Inf. Secur. Sci. 7(3), 100–110 (2018)

    MathSciNet  Google Scholar 

  14. Sihwail, R., Omar, K., Ariffin, K.Z.: A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis. Int. J. Adv. Sci. Eng. Inf. Technol. 8(4–2), 1662–1671 (2018)

    Article  Google Scholar 

  15. Vinod, P., Jaipur, R., Laxmi, V., Gaur, M.: Survey on malware detection methods. In: Proceedings of the 3rd Hackers’ Workshop on Computer and Internet Security (IITKHACK 2009), pp. 74–79 (2009)

    Google Scholar 

  16. Zhao, J., Zhang, S., Liu, B., Cui, B.: Malware detection using machine learning based on the combination of dynamic and static features. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6. IEEE (2018)

    Google Scholar 

  17. Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 421–430. IEEE (2007)

    Google Scholar 

  18. Tang, J., Li, R., Jiang, Y., Gu, X., Li, Y.: Android malware obfuscation variants detection method based on multi-granularity opcode features. Future Gener. Comput. Syst. 129, 141–151 (2022)

    Article  Google Scholar 

  19. Sihag, V., Vardhan, M., Singh, P.: BLADE: robust malware detection against obfuscation in android. Forensic Sci. Int.: Digit. Invest. 38, 301176 (2021)

    Google Scholar 

  20. Sun, C., Zhang, H., Qin, S., Qin, J., Shi, Y., Wen, Q.: DroidPDF- The obfuscation resilient packer detection framework for Android apps. IEEE Access 8, 167460–167474 (2020)

    Article  Google Scholar 

  21. Sultan, AB., Ghani, A.A., Ali, N.M., Admodisastro, N.I.: Hybrid obfuscation technique to protect source code from prohibited software reverse engineering . IEEE Access 8 187326–187342 (2020)

    Google Scholar 

  22. Park, M., You, G., Cho, S.J., Park, M., Han, S.: A framework for identifying obfuscation techniques applied to android apps using machine learning. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 10(4), 22–30 (2019)

    Google Scholar 

  23. Wressnegger, C., Boldewin, F., Rieck, K.: Deobfuscating embedded malware using probable-plaintext attacks. In: Stolfo, S.J., Stavrou, A., Wright, C.V. (eds.) International Workshop on Recent Advances in Intrusion Detection, pp. 164–183. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41284-4_9

    Chapter  Google Scholar 

  24. Sethi, K., Chaudhary, S.K., Tripathy, B.K., Bera, P.: A novel malware analysis framework for malware detection and classification using machine learning approach. In: Proceedings of the 19th International Conference on Distributed Computing and Networking, pp. 1–4 (2018)

    Google Scholar 

  25. Abiola, A.M., Marhusin, M.F.: Signature-based malware detection using sequences of N-grams. Int. J. Eng. Technol. (UAE) (2018)

    Google Scholar 

  26. Anderson, H.S., Roth, P.: Ember: an open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637 (2018)

Download references

Acknowledgements

This work was supported in part by the Ministry of Higher Education through the Fundamental Research Grant Scheme under Grant FRGS/1/2018/ICT04/UTM/01/1; and in part by the Faculty of Informatics and Management, University of Hradec Králové, through the Specific Research Project (SPEV), “Smart Solutions in Ubiquitous Computing Environments”, under Grant 2102/2023. We are also grateful for the support of student Michal Dobrovolny in consultations regarding application aspects.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Selamat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gorment, N.Z., Selamat, A., Krejcar, O. (2023). Obfuscated Malware Detection: Impacts on Detection Methods. In: Nguyen, N.T., et al. Recent Challenges in Intelligent Information and Database Systems. ACIIDS 2023. Communications in Computer and Information Science, vol 1863. Springer, Cham. https://doi.org/10.1007/978-3-031-42430-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42430-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42429-8

  • Online ISBN: 978-3-031-42430-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics