SlideShare a Scribd company logo
Poly/meta-morphic malware looks different each time it is stored on disk or executed. Consider
the challenges of detecting such malware.
Please respond to the following:
•   What is one approach to detect poly/meta-morphic malware? Your answer may
address malware statically stored on disk or running in memory, and you may describe a publicly
known solution or propose something novel.
•   What are the limitations of the method you described?
Solution
Malware is a one type of software which can harm the computer’s operating system and may
also can steal the personal information from the computer, malware can be made by using any
programming language by the programmer. It is very difficult to define a malware with a single
term or a single name. A malware can be consider as a malicious software or malcode or as a
malicious code .Malware do the bulk of the intrusive activities on a system and that spreads itself
across the hosts in a network.
Malware is defined as software performing actions intended by an attacker, mostly with
malicious intentions of stealing information, identity or other resources in the computing
systems.There are different types of malware like adware, bots, Trojan horses, viruses, bugs,
rootkits, spyware and worms. However, attributable to the technology advancement many
malware writers try to use higher concealment techniques to avoid detection. The concealment
technique is created with the combination of previous behaviour therefore on attack and at
identical time to avoid the signature-based detection. In this, several common techniques that are
commonly used like as polymorphic and metamorphic.
Stealth Malware
Malware creators’ initial tries therefore on turn tail from redounded to appear of stealing
techniques. Stealth virus is prepared to cover its signs and traces. Virus normally changes and
modifies info resources on the system. For example, a file-hosted virus would possibly append
its own code to the tip of Associate in possible file. If Associate in application examines the
infected file, it'll discover the being code inside the file and catch the virus.
clustering approach to identify and group harmful programs or apps samples that show almost
the same behavior.almost the same behavior . This approach also energetic/changing analysis to
get the execution traces of harmful programs or apps programs using automated tools.
This approach is used to boost the efficiency of dynamic malware analysis systems . It is a large
sort of latest malicious files presently appears. It’s because of mutations of only variety of
malware programs. The projected system avoids analyzing malware binaries that just represent
mutated instances of already analyzed polymorphic malware. It drastically decrease the quantity
of some time required for analyzing a set of malware programs.

More Related Content

PDF
Survey on Malware Detection Techniques
PDF
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
PDF
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
PPTX
Malware forensic
PPT
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
PPTX
Malware Classification and Analysis
PDF
Basic survey on malware analysis, tools and techniques
PDF
CH1- Introduction to malware analysis-v2.pdf
Survey on Malware Detection Techniques
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Malware forensic
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
Malware Classification and Analysis
Basic survey on malware analysis, tools and techniques
CH1- Introduction to malware analysis-v2.pdf

Similar to Poly-meta-morphic malware looks different each time it is stored on di.docx (20)

PDF
Invesitigation of Malware and Forensic Tools on Internet
PDF
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
PPTX
Malware Detection Using Data Mining Techniques
PDF
A novel ensemble-based approach for Windows malware detection
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PPTX
Cyber Security Threats Unveilded
DOCX
Malware detection
PDF
What Are The Types of Malware? Must Read
PPT
Chapter 1 malware analysis primer
DOCX
Malware Protection Week5Part4-IS Revision Fall2013 .docx
PPTX
Malware analysis
PDF
Problems With Battling Malware Have Been Discussed, Moving...
PDF
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
PDF
Hunting malware via memory forensics
PDF
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
PDF
Artificial Intelligence Methods in Virus Detection & Recognition - Introducti...
PPTX
Malware Detection Approaches using Data Mining Techniques.pptx
PDF
Practical Incident Response - Work Guide
PDF
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
PDF
What is Malware - Digitdefence Cybersecurity Service
Invesitigation of Malware and Forensic Tools on Internet
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
Malware Detection Using Data Mining Techniques
A novel ensemble-based approach for Windows malware detection
Malware and Anti-Malware Seminar by Benny Czarny
Cyber Security Threats Unveilded
Malware detection
What Are The Types of Malware? Must Read
Chapter 1 malware analysis primer
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware analysis
Problems With Battling Malware Have Been Discussed, Moving...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Hunting malware via memory forensics
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Artificial Intelligence Methods in Virus Detection & Recognition - Introducti...
Malware Detection Approaches using Data Mining Techniques.pptx
Practical Incident Response - Work Guide
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
What is Malware - Digitdefence Cybersecurity Service

More from rtodd884 (7)

DOCX
Please write a formal summary of the case before proceeding to answer.docx
DOCX
Please respond in detail with an example- Thank you! Financial interme.docx
DOCX
Problem 1- Text Editor using files and strings using C++ In this proje.docx
DOCX
Presented below is the balance sheet of Sargent Corporation for the cu.docx
DOCX
Presented below is information related to Dino Radja Company- Date End.docx
DOCX
Prepare the journal entry to record salaries payable for the month of.docx
DOCX
Prepare a short --talking points-- paper in which you identify and dis.docx
Please write a formal summary of the case before proceeding to answer.docx
Please respond in detail with an example- Thank you! Financial interme.docx
Problem 1- Text Editor using files and strings using C++ In this proje.docx
Presented below is the balance sheet of Sargent Corporation for the cu.docx
Presented below is information related to Dino Radja Company- Date End.docx
Prepare the journal entry to record salaries payable for the month of.docx
Prepare a short --talking points-- paper in which you identify and dis.docx

Recently uploaded (20)

PDF
Insiders guide to clinical Medicine.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Basic Mud Logging Guide for educational purpose
Insiders guide to clinical Medicine.pdf
Pharma ospi slides which help in ospi learning
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Renaissance Architecture: A Journey from Faith to Humanism
PPH.pptx obstetrics and gynecology in nursing
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
2.FourierTransform-ShortQuestionswithAnswers.pdf
Sports Quiz easy sports quiz sports quiz
Abdominal Access Techniques with Prof. Dr. R K Mishra
Module 4: Burden of Disease Tutorial Slides S2 2025
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Anesthesia in Laparoscopic Surgery in India
Basic Mud Logging Guide for educational purpose

Poly-meta-morphic malware looks different each time it is stored on di.docx

  • 1. Poly/meta-morphic malware looks different each time it is stored on disk or executed. Consider the challenges of detecting such malware. Please respond to the following: •   What is one approach to detect poly/meta-morphic malware? Your answer may address malware statically stored on disk or running in memory, and you may describe a publicly known solution or propose something novel. •   What are the limitations of the method you described? Solution Malware is a one type of software which can harm the computer’s operating system and may also can steal the personal information from the computer, malware can be made by using any programming language by the programmer. It is very difficult to define a malware with a single term or a single name. A malware can be consider as a malicious software or malcode or as a malicious code .Malware do the bulk of the intrusive activities on a system and that spreads itself across the hosts in a network. Malware is defined as software performing actions intended by an attacker, mostly with malicious intentions of stealing information, identity or other resources in the computing systems.There are different types of malware like adware, bots, Trojan horses, viruses, bugs, rootkits, spyware and worms. However, attributable to the technology advancement many malware writers try to use higher concealment techniques to avoid detection. The concealment technique is created with the combination of previous behaviour therefore on attack and at identical time to avoid the signature-based detection. In this, several common techniques that are commonly used like as polymorphic and metamorphic. Stealth Malware Malware creators’ initial tries therefore on turn tail from redounded to appear of stealing techniques. Stealth virus is prepared to cover its signs and traces. Virus normally changes and modifies info resources on the system. For example, a file-hosted virus would possibly append its own code to the tip of Associate in possible file. If Associate in application examines the infected file, it'll discover the being code inside the file and catch the virus.
  • 2. clustering approach to identify and group harmful programs or apps samples that show almost the same behavior.almost the same behavior . This approach also energetic/changing analysis to get the execution traces of harmful programs or apps programs using automated tools. This approach is used to boost the efficiency of dynamic malware analysis systems . It is a large sort of latest malicious files presently appears. It’s because of mutations of only variety of malware programs. The projected system avoids analyzing malware binaries that just represent mutated instances of already analyzed polymorphic malware. It drastically decrease the quantity of some time required for analyzing a set of malware programs.