A Comparison of the Classification of Disparate Malware Collected in Different Time Periods

MD Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy, Lynn M. Batten

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)
76 Downloads (Pure)

Abstract

It has been argued that an anti-virus strategy based on malware collected at a certain date, will not work at a later date because malware evolves rapidly and an anti-virus engine is then faced with a completely new type of executable not as amenable to detection as the first was.In this paper, we test this idea by collecting two sets of malware, the first from 2002 to 2007, the second from 2009 to 2010 to determine how well the anti-virus strategy we developed based on the earlier set [18] will do on the later set. This anti-virus strategy integrates dynamic and static features extracted from the executables to classify malware by distinguishing between families. We also perform another test, to investigate the same idea whereby we accumulate all the malware executables in the old and new dataset, separately, and apply a malware versus cleanware classification.The resulting classification accuracies are very close for both datasets, with a difference of approximately 5.4% for both experiments, the older malware being more accurately classified than the newer malware. This leads us to conjecture that current anti-virus strategies can indeed be modified to deal effectively with new malware.
Original languageEnglish
Pages (from-to)946-955
Number of pages10
JournalJournal of Networks
Volume7
Issue number6
DOIs
Publication statusPublished - 2012

Fingerprint

Dive into the research topics of 'A Comparison of the Classification of Disparate Malware Collected in Different Time Periods'. Together they form a unique fingerprint.

Cite this