Analysis of malware by integrating API extracted from dynamic and memory analysis Online publication date: Fri, 29-Oct-2021
by Nishant Kumar; Lokesh Yadav; Deepak Singh Tomar
International Journal of Swarm Intelligence (IJSI), Vol. 6, No. 2, 2021
Abstract: Nowadays, malware is being developed and implemented on a large-scale, which poses a critical security threat to digital devices. Therefore, effective analysis of malware is an important concern for security experts. Malware software exploits security vulnerabilities of the device and compromises the security of computing settings. Static analysis is a time-consuming approach and requires a lot of manual effort. To overcome this limitation, dynamic analysis was carried in this paper by performing malicious code execution capable enough in identifying multi-functional malware. Sometimes dynamic analysis is unable to handle obfuscated malware due to its API hooking capability. Hence, an approach was applied to combine dynamic analysis technique with memory analysis technique to provide an effective and efficient method for analysing malware using API calls. This approach was performed in a safe and isolated environment to capture the behaviour of the malware. This study shows a noteworthy improvement in accuracy, i.e., 98.62% and reduction in false positive rate, i.e., 1.3%.
Online publication date: Fri, 29-Oct-2021
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Swarm Intelligence (IJSI):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com