Research Output

A framework to detect novel computer viruses via system calls.

  This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objective of an email virus attack is to eventually overwhelm a mail server and clients with large volume of email traffic. A virus achieves this by propagating to other email addresses in the infected email client inbox, alongside activating its payload. In doing this, the virus executes certain malicious processes, resulting in the creation of abnormal system calls via related DLLs. Our research effort advances Stephen Forrester earlier contribution that proved normal and abnormal system calls from a email client in a Unix platform could be differentiated, by describing a framework on how to monitor and detect abnormal system calls in real-time from an email application.

  • Type:

    Book Chapter

  • Date:

    30 November 2005

  • Publication Status:

    Published

  • Publisher

    PGNet

  • Library of Congress:

    QA76 Computer software

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Abimbola, A., Munoz, J. & Buchanan, W. J. (2005). A framework to detect novel computer viruses via system calls. In Merabti, M., Pereira, R. & Abuelma'atti, O. (Eds.). 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 308-313. PGNet. ISBN 1-9025-6013-9

Authors

Keywords

Self-propagating email viruses; determinastic system calls; dynamic link libraries; malicious processes; abnormal system calls; real-time;

Available Documents