skip to main content
10.1145/2330784.2331029acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
poster

New malware detection system using metric-based method and hybrid genetic algorithm

Published: 07 July 2012 Publication History

Abstract

Malicious software, or malware for short, is one of the most serious threats to computer systems. Malware disguise techniques are becoming more sophisticated, and signature-based malware detection systems can not cope with disguised malware timely. In this paper, we propose a new approach to detect disguised malware, focusing on the malware scripts. The proposed system consists of a metric-based detection algorithm and a hybrid genetic algorithm. The genetic algorithm tries further detection by extracting the main core of a program. Experimental tests on the proposed system show a remarkable performance improvement over existing anti-virus programs.

References

[1]
J. Aycock. Computer Viruses and Malware. Springer, 2006.
[2]
N. Idika and A. P. Mathur. A survey of malware detection techniques. Technical Report 286, Purdue University, 2007.
[3]
T. Lancaster and F. Culwin. A Comparison of Source Code Plagiarism Detection Engines. Computer Science Education, 14:101--112, June 2004.

Cited By

View all
  • (2024)Faster Software Development Cycles using Graph-based Code Similarity Analysis2024 Stuttgart International Symposium on Automotive and Engine Technology10.1007/978-3-658-45010-6_12(191-201)Online publication date: 30-Jun-2024
  • (2023)A systematic literature review on source code similarity measurement and clone detectionJournal of Systems and Software10.1016/j.jss.2023.111796204:COnline publication date: 1-Oct-2023
  • (2022)Computer Malware Classification, Factors, and Detection Techniques: A Systematic Literature Review (SLR)International Journal of Innovations in Science and Technology10.33411/IJIST/20220403204:3(899-918)Online publication date: 29-Aug-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '12: Proceedings of the 14th annual conference companion on Genetic and evolutionary computation
July 2012
1586 pages
ISBN:9781450311786
DOI:10.1145/2330784

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 July 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hybrid genetic algorithm
  2. malware detection
  3. malware disguise techniques
  4. metric-based method

Qualifiers

  • Poster

Conference

GECCO '12
Sponsor:
GECCO '12: Genetic and Evolutionary Computation Conference
July 7 - 11, 2012
Pennsylvania, Philadelphia, USA

Acceptance Rates

Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Faster Software Development Cycles using Graph-based Code Similarity Analysis2024 Stuttgart International Symposium on Automotive and Engine Technology10.1007/978-3-658-45010-6_12(191-201)Online publication date: 30-Jun-2024
  • (2023)A systematic literature review on source code similarity measurement and clone detectionJournal of Systems and Software10.1016/j.jss.2023.111796204:COnline publication date: 1-Oct-2023
  • (2022)Computer Malware Classification, Factors, and Detection Techniques: A Systematic Literature Review (SLR)International Journal of Innovations in Science and Technology10.33411/IJIST/20220403204:3(899-918)Online publication date: 29-Aug-2022
  • (2017)Evolutionary computation in network management and securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3067695.3067726(1094-1112)Online publication date: 15-Jul-2017
  • (2017)Malicious VBScript detection algorithm based on data-mining techniques2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 Intl Conf on New Paradigms in Electronics & Information Technology (PEIT)10.1109/ACCS-PEIT.2017.8303028(112-116)Online publication date: Nov-2017
  • (2016)Measuring Source Code Similarity by Finding Similar Subgraph with an Incremental Genetic AlgorithmProceedings of the Genetic and Evolutionary Computation Conference 201610.1145/2908812.2908870(925-932)Online publication date: 20-Jul-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media