Professional Documents
Culture Documents
Ahsan Ullah - 21109109
Ahsan Ullah - 21109109
Ahsan Ullah - 21109109
Problem Statement
Top ten obfuscation techniques found in our dataset. | Top ten malware families in our collected dataset from VirusShare corpus.
Proposed Model
CFG Function
Parameters DLL
-
Network
N Gram Connections
Conclusion
Hybrid analysis technique analyze the signature of malware and
then combine it with behavioral pattern parameter but it only
analyzes the malware that is stored on the disk and the same
malware runs in the memory. Malware that sits and run in the
memory is either not checked or high probability that their
signature and behavioral pattern is not the same as the classic
malware that sits in the hard disk and run in the memory.