A Sense of `Danger' for Windows Processes

  • Authors:
  • Salman Manzoor;M. Zubair Shafiq;S. Momina Tabish;Muddassar Farooq

  • Affiliations:
  • Next Generation Intelligent Networks Research Center (nexGIN RC), FAST National University of Computer & Emerging Sciences (NUCES), Islamabad, Pakistan 44000;Next Generation Intelligent Networks Research Center (nexGIN RC), FAST National University of Computer & Emerging Sciences (NUCES), Islamabad, Pakistan 44000;Next Generation Intelligent Networks Research Center (nexGIN RC), FAST National University of Computer & Emerging Sciences (NUCES), Islamabad, Pakistan 44000;Next Generation Intelligent Networks Research Center (nexGIN RC), FAST National University of Computer & Emerging Sciences (NUCES), Islamabad, Pakistan 44000

  • Venue:
  • ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In this paper, we investigate the suitability of recently proposed Dendritic Cell Algorithms (DCA), both classical DCA (cDCA) and deterministic DCA (dDCA), for malware detection at run-time. We have collected API call traces of real malware and benign processes running on Windows operating system. We evaluate the accuracy of cDCA and dDCA for classifying between malware and benign processes using API call sequences. Moreover, we also study the effects of antigen multiplier and time-windows on the detection accuracy of both algorithms.