Journal on Communications ›› 2014, Vol. 35 ›› Issue (8): 125-136.doi: 10.3969/j.issn.1000-436x.2014.08.016

• Academic paper • Previous Articles     Next Articles

Research on malicious code variants detection based on texture fingerprint

Xiao-guang HAN1,UWu Q2,3,AOXuan-xia Y1,UOChang-you G1,Fang ZHOU1   

  1. 1 School of Computer&Communication Engineer, University of Science&Technology Beijing, Beijing 10083, China
    2 Core Research Institute, Beijing Venustech Cybervision Co. Ltd., Beijing 100193, China
    3 Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
  • Online:2014-08-25 Published:2017-06-29
  • Supported by:
    The National Basic Research Program of China (973 Program);The National Natural Science Foundation of China, Key Program;The National Natural Science Foundation of China, General Program

Abstract:

A texture-fingerprint-based approach is proposed to extract or detect the feature from malware content. The texture fingerprint of a malware is the set of texture fingerprints for each uncompressed gray-scale image block. The ma-licious code is mapped to uncompressed gray-scale image by integrating image analysis techniques and variants of mali-cious code detection technology. The uncompressed gray-scale image is partitioned into blocks by the texture segmen-tation algorithm. The texture fingerprints for each uncompressed gray-scale image block is extracted by gray-scale co-occurrence matrix algorithm. Afterwards, the index structure for fingerprint texture is built on the statistical analy-sis of general texture fingerprints of malicious code samples. In the detection phase, according to the generation policy for malicious code texture fingerprint, the prototype system for texture fingerprint extraction and detection is con-structed by employing the integrated weight method to multi-segmented texture fingerprint similarity matching to de-tect variants and unknown malicious codes. Experimental results show that the malware variants detection system based on the proposed approach has good performance not only in speed and accuracy but also in identifying malware variants.

Key words: network security, malware variants detection, texture fingerprint, spatial similarity retrieval

No Suggested Reading articles found!