PDF ACCESS
Authors
Hazem Mostafa Mahmoud Samy
Amer Mohamed Amer Mohamed
Mohamed Amin Abdelaziz Mohamed
Adham Samir Mohamed ElShehaat
Dr. Eslam Amer
Eng.Youssef Talaat
Publishing Date
25 Jan 2022
Abstract
The rising increase of malicious software poses a threat of an immense nature, whereas the reciprocating of data is not limited to personal daily transactions, but dwelled deeply within large enterprises and organizations. The purpose of this project is to achieve a new approach in detecting mimicry malware that disguises itself to resemble a valid software to bypass the conventional antiviruses which are mainly signature-based anti-viruses. The proposed antivirus would follow a dynamic analysis interpretation of detecting malicious software using machine learning techniques, thus evolving and adapting to the ever-changing process of formation of malware.
1.1 Purpose
The purpose of this SDD document is to outline and represent the design of the project Malware Mimicry detection on the basis of API call sequence pattern, furthermore we explore the design features and functionalities that represents the system showing how the system would deal with user interactions and clarifying the main architecture of the system
1.2 Scope
This document provides a detailed description of the software design, whilst clarifying and illustrating in detail the choices of design taken that complements and serves the functionalities listed them being the functional and non-functional requirements specified beforehand in the software requirements, while providing a test plan and explaining the expanded architecture of the system scope.
1.3 Overview
This document is composed of the following sections. First section includes: purpose, scope and intended audience and reference material. Second section includes: project overview illustrating the system’s model, scope, objectives, and project timeline. Third section includes the context diagram, and use-case diagram, system logical viewpoint, design rationale, patterns, composition, structure, algorithm, interaction and interface viewpoints. The fourth section includes database design and description. The fifth section includes the human interface design (user interface and screen images) and describes how the user will interact with the system. The sixth section is the requirement matrix that shows the functional requirements it’s status. The other sections are appendices and references.
1.4 Intended audience
Intended audience include all Windows OS users