Malware Detection using Computational Biology Tools

The Internet is considered to be as a rich platform of information where many people get benefit from its access but still they are being attacked by computer malwares and various other threats which distract their normal work flow to be carried out in an efficient manner. In this paper, we give an overview of the efficient read aligner software termed as REAL which is used for next generation sequencing. It reads structures as a tool to detect computer Malware. Using this tools a dynamic computer malware detection model has been presented in this paper that can detect the malwares to prevent attacks which might cause damaging or stealing sensitive information. This model is inspired by REAL which is an efficient read aligner for next generation sequencing for processing biological data. New anti-Malware technologies are introduced to the world by the clock, but at the same time new malware techniques have also emerged to misuse these technologies. Experimental results of this study shows that the proposed system is efficient and it is a novel way for detecting malware code embedded in different types of computer files, using bioinformatics tools with consistency and accuracy in detecting the malware and it was able to complete the assignment in high speed without excessive memory usages.

[1]  W. Doyle,et al.  Magnetization reversal in films with biaxial anisotropy , 1966 .

[2]  Costas S. Iliopoulos,et al.  Mapping uniquely occurring short sequences derived from high throughput technologies to a reference genome , 2009, 2009 9th International Conference on Information Technology and Applications in Biomedicine.

[3]  Xin Zhou,et al.  MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications , 2008, Seventh International Conference on Networking (icn 2008).

[4]  Costas S. Iliopoulos,et al.  Detection of fixed length web spambot using REAL (read aligner) , 2012, CUBE.

[5]  Dan Gusfield,et al.  Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .

[6]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[7]  Robert S. Boyer,et al.  A fast string searching algorithm , 1977, CACM.

[8]  Costas S. Iliopoulos,et al.  REAL: an efficient REad ALigner for next generation sequencing reads , 2010, BCB '10.

[10]  Alfred V. Aho,et al.  Efficient string matching , 1975, Commun. ACM.

[11]  Wenke Lee,et al.  Classification of packed executables for accurate computer virus detection , 2008, Pattern Recognit. Lett..

[12]  Kangbin Yim,et al.  Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[13]  B. S. Manjunatha,et al.  DETECTING PACKED EXECUTABLES BASED ON RAW BINARY DATA , 2010 .

[14]  Dan Gusfield,et al.  Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .

[15]  Aditya P. Mathur,et al.  A Survey of Malware Detection Techniques , 2007 .

[16]  Somesh Jha,et al.  A semantics-based approach to malware detection , 2008, TOPL.