Analysis of the Zero-Day Detection of Metamorphic Malware


Gulmez S., KAKIŞIM A., Sogukpinar I.

9th International Conference on Computer Science and Engineering, UBMK 2024, Antalya, Türkiye, 26 - 28 Ekim 2024, ss.731-736, (Tam Metin Bildiri) identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Doi Numarası: 10.1109/ubmk63289.2024.10773421
  • Basıldığı Şehir: Antalya
  • Basıldığı Ülke: Türkiye
  • Sayfa Sayıları: ss.731-736
  • Anahtar Kelimeler: metamorphic malware, ransomware, static analysis, zero-day malware detection
  • Yıldız Teknik Üniversitesi Adresli: Evet

Özet

Metamorphic malware is a kind of malware that modifies its source code with each new infection. The source code modification is carried out by a morphing engine that applies particular metamorphism techniques, which allows each metamorphic variant of a malware to have a unique signature, disabling signature-based detection models. Therefore, behavioral analysis becomes essential for malware detection. A behavioral analysis-based detection model trained on data from a specific morphing engine can detect new metamorphic variants produced by that same engine. However, these models often struggle with samples generated by different morphing engines, i.e. zero-day metamorphic malware. Due to the concept drift problem, which is also challenging for many classification and detection problems, many existing malware detection methods tend to underperform when tested on a dataset different from the malware dataset they were trained on. In this study, we aim to explore this issue and examine potential solutions for zero-day metamorphic malware detection using different approaches based on static analysis along with machine and deep learning techniques. We also utilize ransomware samples in order to show their contribution to metamorphic malware detection. Experiments we conducted demonstrate that zero-day metamorphic malware can be effectively detected using a straightforward and efficient model that leverages opcode sequences.