Research on the Classification Model of Similarity Malware using Fuzzy Hash

Vol. 22, No. 6, pp. 1325-1336, Dec. 2012
10.13089/JKIISC.2012.22.6.1325, Full Text:
Keywords: Fuzzy Hash, Malware, similarity
Abstract

In the past about 10 different kinds of malicious code were found in one day on the average. However, the number of malicious codes that are found has rapidly increased reachingover 55,000 during the last 10 year. A large number of malicious codes, however, are not new kinds of malicious codes but most of them are new variants of the existing malicious codes as same functions are newly added into the existing malicious codes, or the existing malicious codes are modified to evade anti-virus detection. To deal with a lot of malicious codes including new malicious codes and variants of the existing malicious codes, we need to compare the malicious codes in the past and the similarity and classify the new malicious codes and the variants of the existing malicious codes. A former calculation method of the similarity on the existing malicious codes compare external factors of IPs, URLs, API, Strings, etc or source code levels. The former calculation method of the similarity takes time due to the number of malicious codes and comparable factors on the increase, and it leads to employing fuzzy hashing to reduce the amount of calculation. The existing fuzzy hashing, however, has some limitations, and it causes come problems to the former calculation of the similarity. Therefore, this research paper has suggested a new comparison method for malicious codes to improve performance of the calculation of the similarity using fuzzy hashing and also a classification method employing the new comparison method.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
C. Park, H. Chung, K. Seo, S. Lee, "Research on the Classification Model of Similarity Malware using Fuzzy Hash," Journal of The Korea Institute of Information Security and Cryptology, vol. 22, no. 6, pp. 1325-1336, 2012. DOI: 10.13089/JKIISC.2012.22.6.1325.

[ACM Style]
Changwook Park, Hyunji Chung, Kwangseok Seo, and Sangjin Lee. 2012. Research on the Classification Model of Similarity Malware using Fuzzy Hash. Journal of The Korea Institute of Information Security and Cryptology, 22, 6, (2012), 1325-1336. DOI: 10.13089/JKIISC.2012.22.6.1325.