Detection of Malicious Portable Executables using Evidence Combinational Theory with Fuzzy Hashing
dc.contributor.author | Namanya, Anitta Patience | |
dc.contributor.author | Khan Ali Mirza, Qublai | |
dc.contributor.author | Al-Mohannadi, Hamad | |
dc.contributor.author | Awan, Irfan U. | |
dc.contributor.author | Ferdinand Pagna Disso, Jules | |
dc.date.accessioned | 2023-05-05T17:08:24Z | |
dc.date.available | 2023-05-05T17:08:24Z | |
dc.date.issued | 2016 | |
dc.description.abstract | Fuzzy hashing is a known technique that has been adopted to speed up malware analysis processes. However, Hashing has not been fully implemented for malware detection because it can easily be evaded by applying a simple obfuscation technique such as packing. This challenge has limited the usage of hashing to triaging of the samples based on the percentage of similarity between the known and unknown. In this paper, we explore the different ways fuzzy hashing can be used to detect similarities in a file by investigating particular hashes of interest. Each hashing method produces independent but related interesting results which are presented herein. We further investigate combination techniques that can be used to improve the detection rates in hashing methods. Two such evidence combination theory based methods are applied in this work in order propose a novel way of combining the results achieved from different hashing algorithms. This study focuses on file and section Ssdeep hashing, PeHash and Imphash techniques to calculate the similarity of the Portable Executable files. Our results show that the detection rates are improved when evidence combination techniques are used. | en_US |
dc.identifier.citation | Namanya, A. P., Mirza, Q. K. A., Al-Mohannadi, H., Awan, I. U., & Disso, J. F. P. (2016, August). Detection of malicious portable executables using evidence combinational theory with fuzzy hashing. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 91-98). IEEE. DOI 10.1109/FiCloud.2016.21 | en_US |
dc.identifier.other | 10.1109/FiCloud.2016.21 | |
dc.identifier.uri | https://nru.uncst.go.ug/handle/123456789/8635 | |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Malware detection | en_US |
dc.subject | Fuzzy hash | en_US |
dc.subject | Evidence combinational theory | en_US |
dc.subject | Common Factor Model | en_US |
dc.subject | Fuzzy Logic | en_US |
dc.subject | Portable executable | en_US |
dc.title | Detection of Malicious Portable Executables using Evidence Combinational Theory with Fuzzy Hashing | en_US |
dc.type | Other | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Detection of Malicious Portable Executables using.pdf
- Size:
- 442.95 KB
- Format:
- Adobe Portable Document Format
- Description:
- Proceedings
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: