PDF ACCESS

Authors

Hazem Mostafa Mahmoud Samy

Amer Mohamed Amer Mohamed

Mohamed Amin Abdelaziz Mohamed

Adham Samir Mohamed ElShehaat

Dr. Eslam Amer

Eng.Youssef Talaat



Publishing Date

25 Jan 2022

Abstract

The rising increase of malicious software poses a threat of an immense nature, whereas the reciprocating of data is not limited to personal daily transactions, but dwelled deeply within large enterprises and organizations. The purpose of this project is to achieve a new approach in detecting mimicry malware that disguises itself to resemble a valid software to bypass the conventional antiviruses which are mainly signature-based anti-viruses. The proposed antivirus would follow a dynamic analysis interpretation of detecting malicious software using machine learning techniques, thus evolving and adapting to the ever-changing process of formation of malware.

1.1 Purpose

The purpose of this SDD document is to outline and represent the design of the project Malware Mimicry detection on the basis of API call sequence pattern, furthermore we explore the design features and functionalities that represents the system showing how the system would deal with user interactions and clarifying the main architecture of the system

1.2 Scope

This document provides a detailed description of the software design, whilst clarifying and illustrating in detail the choices of design taken that complements and serves the functionalities listed them being the functional and non-functional requirements specified beforehand in the software requirements, while providing a test plan and explaining the expanded architecture of the system scope.

1.3 Overview

This document is composed of the following sections. First section includes: purpose, scope and intended audience and reference material. Second section includes: project overview illustrating the system’s model, scope, objectives, and project timeline. Third section includes the context diagram, and use-case diagram, system logical viewpoint, design rationale, patterns, composition, structure, algorithm, interaction and interface viewpoints. The fourth section includes database design and description. The fifth section includes the human interface design (user interface and screen images) and describes how the user will interact with the system. The sixth section is the requirement matrix that shows the functional requirements it’s status. The other sections are appendices and references.

1.4 Intended audience

Intended audience include all Windows OS users