Show simple item record

dc.contributor.authorNaidu, Ven_NZ
dc.contributor.authorWhalley, Jen_NZ
dc.contributor.authorNarayanan, Aen_NZ
dc.date.accessioned2018-11-05T21:57:13Z
dc.date.available2018-11-05T21:57:13Z
dc.date.copyright2018-10-19en_NZ
dc.identifier.citationJournal of Information Security, 8, 296-327. https://doi.org/10.4236/jis.2017.84020
dc.identifier.issn2153-1234en_NZ
dc.identifier.urihttp://hdl.handle.net/10292/11946
dc.description.abstractAntiviral software systems (AVSs) have problems in identifying polymorphic variants of viruses without explicit signatures for such variants. Alignment- based techniques from bioinformatics may provide a novel way to generate signatures from consensuses found in polymorphic variant code. We demonstrate how multiple sequence alignment supplemented with gap penalties leads to viral code signatures that generalize successfully to previously known polymorphic variants of JS. Cassandra virus and previously unknown polymorphic variants of W32.CTX/W32.Cholera and W32.Kitti viruses. The implications are that future smart AVSs may be able to generate effective signatures automatically from actual viral code by varying gap penalties to cover for both known and unknown polymorphic variants.en_NZ
dc.publisherScientific Research Publishingen_NZ
dc.relation.urihttps://file.scirp.org/Html/2-7800468_79687.htmen_NZ
dc.rightsCopyright © 2017 by authors and Scientific Research Publishing Inc.This work is licensed under the Creative Commons Attribution International License (CC BY 4.0).http://creativecommons.org/licenses/by/4.0/
dc.subjectPolymorphic Malware Variants; Gap Penalties; Syntactic Approach; Pairwise Sequence Alignment; Multiple Sequence Alignment; Automatic Signature Generation; Smith-Waterman Algorithm; JS. Cassandra Virus; W32.CTX/W32.Cholera Virus; W32.Kitti Virus
dc.titleGenerating Rule-based Signatures for Detecting Polymorphic Variants Using Data Mining and Sequence Alignment Approachesen_NZ
dc.typeJournal Article
dc.rights.accessrightsOpenAccessen_NZ
dc.identifier.doi10.4236/jis.2017.84020en_NZ
aut.relation.endpage298
aut.relation.startpage265
aut.relation.volume9en_NZ
pubs.elements-id348402
aut.relation.journalJournal of Information Securityen_NZ


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record