Skip to main content

Feature Based Comparative Analysis of Online Malware Scanners (OMS)

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1201))

Abstract

Threat Intelligence is evidence-based knowledge that helps to understand, predict and adapt the behavior of an existing or emerging threats. Threat Intelligence can be used to decide on the subject’s response to its threat. Several components provide information about threats. Online Malware Scanners (OMS) are part of the general threat intelligence that the entire system can provide when searching for files, URLs, hashes, CVEs, IP addresses and domain names. Among other industrial technologies, threat intelligence has also proven its importance to reduce the human effort in detection, prevention and analysis of a malware. The paper covers the comparative analysis of OMS that would assist the industrial research and development (R&D) teams, cybersecurity researchers and students to decide the best suitable OMS for their deployed cyber physical systems in order to efficiently automate the whole process of threat intelligence and ultimately reducing the impact of external attacks on the overall cyber infrastructure of industrial organizations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Saeed, I.A., Selamat, A., Abuagoub, A.M.A.: A survey on malware and malware detection systems. Int. J. Comput. Appl. 67(16), 25–31 (2013)

    Google Scholar 

  2. Gasse. https://www.kaspersky.com/blog/secure-futures-magazine/malwaretrends-2019/28098/. Accessed 30 Jan 2020

  3. Souppaya, M., Scarfone, K.: Guide to malware incident prevention and handling for desktops and laptops. NIST Spec. Publ. 800, 83 (2013)

    Google Scholar 

  4. Mohamed, G.A.N., Norafida, I.: Survey on representation techniques for malware detection system. Am. J. Appl. Sci. 14, 1049–1069 (2017). https://doi.org/10.3844/ajassp.2017.1049.1069

    Article  Google Scholar 

  5. https://www.reversinglabs.com/solutions/sandbox-malware-analysis. Accessed 31 Jan 2020

  6. Ozsoy, M., et al.: Malware-aware processors: a framework for efficient online malware detection. In: 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA). IEEE (2015)

    Google Scholar 

  7. Damodaran, A., et al.: A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech. 13(1), 1–12 (2017)

    Article  Google Scholar 

  8. Juwono, J.T., Lim, C., Erwin, A.: A comparative study of behavior analysis sandboxes in malware detection. In: International Conference on New Media (CONMEDIA) (2015)

    Google Scholar 

  9. Uppal, D., Mehra, V., Verma, V.: Basic survey on malware analysis, tools and techniques. Int. J. Comput. Sci. Appl. (IJCSA) 4(1), 103 (2014)

    Google Scholar 

  10. Galal, H.S., Mahdy, Y.B., Atiea, M.A.: Behavior-based features model for malware detection. J. Comput. Virol. Hacking Tech. 12(2), 59–67 (2016)

    Article  Google Scholar 

  11. Bhattacharya, A., Goswami, R.T.: Comparative analysis of different feature ranking techniques in data mining-based Android malware detection. In: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Springer, Singapore (2017)

    Google Scholar 

  12. Ranveer, S., Hiray, S.: Comparative analysis of feature extraction methods of malware detection. Int. J. Comput. Appl. 120(5), 1–7 (2015)

    Google Scholar 

  13. Lindorfer, M., Kolbitsch, C., Comparetti, P.M.: Detecting environment-sensitive malware. In: International Workshop on Recent Advances in Intrusion Detection. Springer, Heidelberg (2011)

    Google Scholar 

  14. Pandey, S.K., Mehtre, B.M.: Performance of malware detection tools: a comparison. In: 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies. IEEE (2014)

    Google Scholar 

  15. Bekerman, D., et al.: Unknown malware detection using network traffic classification. In: 2015 IEEE Conference on Communications and Network Security (CNS). IEEE (2015)

    Google Scholar 

  16. Tuvell, G., Lee, C.: Malware detection system and method for limited access mobile platforms. U.S. Patent No. 9,064,115, 23 June 2015

    Google Scholar 

  17. https://www.opswat.jp/blog/metadefender-more-private-alternativevirustotal#hash-lookup. Accessed 19 Feb 2020

Download references

Acknowledgments

We would like to acknowledge School of Mechanical and Manufacturing Engineering (SMME), National University of Sciences and Technology (NUST), Pakistan and European Union (EU)’s Horizon 2020, Research and Innovation Staff Exchange Evaluations (RISE) under grant agreement no. 823904 – ENHANCE Project (MSCA-RISE 823904) for technical support and funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akash Gerard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Johar, A.H., Gerard, A., Athar, N., Asgher, U. (2021). Feature Based Comparative Analysis of Online Malware Scanners (OMS). In: Ayaz, H., Asgher, U. (eds) Advances in Neuroergonomics and Cognitive Engineering. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1201. Springer, Cham. https://doi.org/10.1007/978-3-030-51041-1_51

Download citation

Publish with us

Policies and ethics