Skip to main content

Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models

  • Chapter
  • First Online:
Guide to Vulnerability Analysis for Computer Networks and Systems

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Encrypted code is often present in some types of advanced malware, while such code virtually never appears in legitimate applications. Hence, the presence of encrypted code within an executable file could serve as a strong heuristic for malware detection. In this chapter, we consider the feasibility of detecting encrypted segments within an executable file using hidden Markov models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    An HMM score is dependent on the length of the sequence scored. Therefore, in each case we normalize the score so that it is given as a log likelihood per opcode (LLPO).

References

  1. Swain B (2009) What are malware, viruses, spyware, and cookies, and what differentiates them? https://www.symantec.com/connect/articles/what-are-malware-viruses-spyware-and-cookies-and-what-differentiates-them

  2. Nachenberg C (1996) Understanding and managing polymorphic viruses. In: The symantec enterprise papers. Symantec. https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/understanding-and-managing-polymorphic-viruses-96-en.pdf

  3. Computer Knowledge (2013). http://www.cknow.com/cms/vtutor/types-of-viruses.html

  4. Stamp M (2011) Information security: principles and practice. Wiley, New York

    Google Scholar 

  5. DaBoss (2013) Robert slade computer virus history. http://www.cknow.com/cms/vtutor/robert-slade-computer-virus-history.html

  6. Radeska T (2016) Brain — The first computer virus, the vintage news. http://www.thevintagenews.com/2016/09/08/priority-brain-first-computer-virus-created-two-brothers-pakistan-just-wanted-prevent-customers-making-illegal-software-copies/

  7. Szor P (2005) The art of computer virus research and defense. Pearson Education. https://books.google.com/books?id=XE-ddYF6uhYC

  8. Rad BB, Masrom M, Ibrahim S (2012) Camouflage in malware: from encryption to metamorphism. Int J Comput Sci Netw Secur 12(8):74–83

    Google Scholar 

  9. Li X, Loh PKK, Tan F (2011) Mechanisms of polymorphic and metamorphic viruses. In: 2011 European intelligence and security informatics conference. pp 149–154

    Google Scholar 

  10. Symantec: viruses that can cost you. http://www.symantec.com/region/reg_eu/resources/virus_cost.html

  11. Symantec: security 1:1 — Part 1: viruses and worms (2013). https://www.symantec.com/connect/articles/security-11-part-1-viruses-and-worms

  12. Venkatachalam S (2010) Detecting undetectable computer viruses. http://scholarworks.sjsu.edu/etd_projects/156/

  13. Zwanger V, Gerhards-Padilla E, Meier M (2014) Codescanner: Detecting (hidden) x86/x64 code in arbitrary files. In: Malicious and unwanted software: the americas (MALWARE), 2014 9th international conference on malicious and unwanted software. IEEE, pp 118–127

    Google Scholar 

  14. Schultz MG, Eskin E, Zadok F, Stolfo SJ (2001) Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE symposium on security and privacy. SP, pp 38–49

    Google Scholar 

  15. Shabtai A, Moskovitch R, Elovici Y, Glezer C (2009) Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Inf Secur Tech Rep 14(1):16–29. https://doi.org/10.1016/j.istr.2009.03.003

    Article  Google Scholar 

  16. Stamp M (2004) A revealing introduction to hidden Markov models. https://www.cs.sjsu.edu/~stamp/RUA/HMM.pdf

  17. Jurafsky D, Martin JH (2000) Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 1st edn. Prentice Hall PTR, USA

    Google Scholar 

  18. Cave RL, Neuwirth LP (1980) Hidden Markov models for English. In: Ferguson JD (ed) Hidden Markov Models for Speech

    Google Scholar 

  19. Brown corpus of standard American English (2010). http://www.cs.toronto.edu/~gpenn/csc401/a1res.html

  20. Vobbilisetty R, Troia FD, Low RM, Visaggio CA, Stamp M (2017) Classic cryptanalysis using hidden Markov models. Cryptologia 41(1):1–28. https://doi.org/10.1080/01611194.2015.1126660

    Article  Google Scholar 

  21. Ganesh N, Di Troia F, Corrado VA, Austin TH, Stamp M (2016) Static analysis of malicious Java applets. In: Proceedings of the 2016 ACM on international workshop on security and privacy analytics. IWSPA ’16. ACM, USA, pp 58–63, http://doi.acm.org/10.1145/2875475.2875477

  22. Rabiner LR (1989) A tutorial on hidden markov models and selected applications in speech recognition. IEEE Proc 77(2):257–286

    Article  Google Scholar 

  23. Shanmugam G, Low RM, Stamp M (2013) Simple substitution distance and metamorphic detection. J Comput Virol Hacking Tech 9(3):159–170

    Article  Google Scholar 

  24. Wong W, Stamp M (2006) Hunting for metamorphic engines. J Comput Virol 2(3):211–229. https://doi.org/10.1007/s11416-006-0028-7

    Article  Google Scholar 

  25. Shamir A, Van Someren N (1999) Playing hide and seek with stored keys. In: International conference on financial cryptography. Springer, Berlin, pp 118–124

    Google Scholar 

  26. Dhanasekar D (2017) Detecting encrypted malware using hidden Markov models. Master’s project, Department of Computer Science, San Jose State University. http://scholarworks.sjsu.edu/etd_projects/574/

  27. Bradley AP (1997) The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognit 30(7):1145–1159

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark Stamp .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Dhanasekar, D., Di Troia, F., Potika, K., Stamp, M. (2018). Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models. In: Parkinson, S., Crampton, A., Hill, R. (eds) Guide to Vulnerability Analysis for Computer Networks and Systems. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-92624-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92624-7_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92623-0

  • Online ISBN: 978-3-319-92624-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics