MalPro: A Learning-based Malware Propagation and Containment Modeling

被引:2
作者
Valizadeh, Saeed [1 ]
van Dijk, Marten [2 ]
机构
[1] Univ Connecticut, Dept Comp Sci & Engn, Storrs, CT 06269 USA
[2] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
来源
CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP | 2019年
关键词
Botnet; Malware; Propagation Modeling; Self-replicating Code; Worm; Intrusion Detection and Prevention System; Honeypot; Cloud Security; Learning-based Model; Security Games; SIGNATURES;
D O I
10.1145/3338466.3358920
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we investigate the importance of a defense system's learning rates to fight against the self-propagating class of malware such as worms and bots. To this end, we introduce a new propagation model based on the interactions between an adversary (and its agents) who wishes to construct a zombie army of a specific size, and a defender taking advantage of standard security tools and technologies such as honeypots (HPs) and intrusion detection and prevention systems (IDPSes) in the network environment. As time goes on, the defender can incrementally learn from the collected/observed attack samples (e.g., malware payloads), and therefore being able to generate attack signatures. The generated signatures then are used for filtering next attack traffic and thus containing the attacker's progress in its malware propagation mission. Using simulation and numerical analysis, we evaluate the efficacy of signature generation algorithms and in general any learning-based scheme in bringing an adversary's maneuvering in the environment to a halt as an adversarial containment strategy.
引用
收藏
页码:45 / 56
页数:12
相关论文
共 37 条
[1]  
[Anonymous], 2004, P 6 C S OP SYST DES
[2]  
[Anonymous], 2018, ANN CYB REP
[3]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[4]  
Chen Y, 2006, LECT NOTES COMPUT SC, V4318, P153
[5]   An Information-Theoretic View of Network-Aware Malware Attacks [J].
Chen, Zesheng ;
Ji, Chuanyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) :530-541
[6]  
Chen ZS, 2003, IEEE INFOCOM SER, P1890
[7]  
Chenglu Jin, 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS). Proceedings, P824, DOI 10.1109/ICPHYS.2018.8390813
[8]  
Dagon D., 2006, NDSS, V6, P2
[9]   A Survey of Botnet and Botnet Detection [J].
Feily, Maryam ;
Shahrestani, Alireza ;
Ramadass, Sureswaran .
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, :268-+
[10]  
Fogla P, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P241