Uncovering the Elusive Threat: An Investigative Study on Polymorphic Viruses
Abstract
In the intricate landscape of cybersecurity, polymorphic viruses have prominently emerged, distinguishing themselves through their unique ability to continually modify their code, rendering them stealthy and challenging to detect. This comprehensive study embarks on a journey through the complex world of these viruses. It commences with a historical lens, meticulously tracing their roots, their initial manifestations, and the progressive sophistication of their code-altering techniques. The research then pivots to a detailed conceptual examination, shedding light on the defining hallmarks of polymorphic viruses. This includes their adeptness at employing encryption, code obfuscation, and mutation methodologies as shields against traditional detection mechanisms. While conventional antivirus tools often grapple with these elusive threats, the paper underscores the growing efficacy and relevance of cutting-edge techniques such as sandboxing, dynamic analysis, and adaptive machine learning-based approaches in the detection arena. In light of the inherent detection hurdles, the narrative stresses the paramount importance of proactive defence mechanisms. Central to this are the pillars of real-time threat intelligence, collaborative information-sharing ecosystems, and the strategic deployment of multi-layered security frameworks. Projecting into the future, the research contemplates the relentless evolution of polymorphic virus tactics and postulates the necessity for cybersecurity measures to be not only reactive but also predictive. Culminating the discourse, the study reiterates the persistent and intensifying significance of addressing the challenges posed by polymorphic viruses in our digital age.
Keywords
Full Text:
PDFReferences
Bajaj S, Banerjee M. In vitro assembly of polymorphic virus-like particles from the capsid protein of a nodavirus. Virology. 2016 Sep 1; 496: 106–15.
Lin Z, Cantone J, Lu H, Nowicka-Sans B, Protack T, Yuan T, Yang H, Liu Z, Drexler D, Regueiro-Ren A, Meanwell NA. Mechanistic studies and modeling reveal the origin of differential inhibition of Gag polymorphic viruses by HIV-1 maturation inhibitors. PLoS Pathog. 2016 Nov 28; 12(11): e1005990.
Naidu V, Whalley J, Narayanan A. Exploring the effects of gap-penalties in sequence-alignment approach to polymorphic virus detection. J Inf Secur. 2017 Oct 19; 8(04): 296.4
A Hamid IR, Subramaniam S, Sutoyo E, Abdullah Z. Classification of polymorphic virus based on integrated features. Int J Adv Sci Eng Inf Technol. 2018; 8(6): 2577–83.
Beaucamps P. Advanced polymorphic techniques. Int J Comput Inf Eng. 2007 Oct 29; 1(10): 3366–77.
Kasina A, Suthar A, Kumar R. Detection of polymorphic viruses in windows executables. In Contemporary Computing: Third International Conference, IC3 2010, Noida, India, August 9-11, 2010, Proceedings, Part II 3 2010 (pp. 120–130). Springer Berlin Heidelberg.
Eberbach E. Capturing evolution of polymorphic viruses. InProc. IX National Conf. on Evolutionary Computation and Global Optimization KAEiOG 2006 (Vol. 6, pp. 125–138).
Shadrach D. A detection methodology for polymorphic viruses. State University of New York Institute of Technology; 2006.
Kim C, Lee SU, Hong M. Macroscopic treatment to polymorphic e-mail based viruses. In International Conference on Computational Science and Its Applications 2004 May 14 (pp. 867–876). Berlin, Heidelberg: Springer Berlin Heidelberg.
Szappanos G. Are there any polymorphic macro viruses at all?(… and what to do with them). In Proceedings of the 12th International Virus Bulletin Conference 2002 Sep.
Naidu V, Narayanan A. A syntactic approach for detecting viral polymorphic malware variants. In Intelligence and Security Informatics: 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings 11 2016 (pp. 146–165). Springer International Publishing.
Lau M, Wee C, Lang J. Instruction Usage in Evolving Polymorphic Viruses1. preprint. Available https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=fd0b7184e86cc2b39ce7ef7f21d80b38280bf2cb
Borello JM, Mé L. Code obfuscation techniques for metamorphic viruses. J Comput Virol. 2008 Aug; 4(3): 211–20.
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Journal of Network Security
- eISSN: 2395–6739
- ISSN: 2321–8517