Detecting Internet Worms Using Data Mining Techniques

被引:0
|
作者
Siddiqui, Muazzam [1 ]
Wang, Morgan C. [2 ]
Lee, Joohan [3 ]
机构
[1] Univ Cent Florida, Inst Simulat & Training, Orlando, FL 32816 USA
[2] Univ Cent Florida, Dept Stat & Actuarial Sci, Orlando, FL 32816 USA
[3] Univ Cent Florida, Sch Elect Engn & Comp Sci, Orlando, FL 32816 USA
关键词
Data Mining; Worm Detection; Binary Classification; Static Analysis; Disassembly; Instruction Sequences;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet worms pose a serious threat to computer security. Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature patterns to identifying the malicious behavior displayed by the malwares. This paper presents a novel idea of extracting variable length instruction sequences that can identify worms from clean programs using data mining techniques. The analysis is facilitated by the program control flow information contained in the instruction sequences. Based upon general statistics gathered from these instruction sequences we formulated the problem as a binary classification problem and built tree based classifiers including decision tree, bagging and random forest. Our approach showed 95.6% detection rate on novel worms whose data was not used in the model building process. http://www.iiisci.org/journal/CV$/sci/pdfs/QI505RM.pdf
引用
收藏
页码:129 / +
页数:3
相关论文
共 50 条
  • [1] Detecting Trojans Using Data Mining Techniques
    Siddiqui, Muazzam
    Wang, Morgan C.
    Lee, Joohan
    WIRELESS NETWORKS, INFORMATION PROCESSING AND SYSTEMS, 2008, 20 : 400 - 411
  • [2] Detecting trojans using data mining techniques
    University of Central Florida, United States
    Commun. Comput. Info. Sci., (400-411):
  • [3] Detecting financial restatements using data mining techniques
    Dutta, Ila
    Dutta, Shantanu
    Raahemi, Bijan
    EXPERT SYSTEMS WITH APPLICATIONS, 2017, 90 : 374 - 393
  • [4] Detecting Arabic YouTube Spam Using Data Mining Techniques
    Tashtoush, Yahya
    Magableh, Areen
    Darwish, Omar
    Smadi, Lujain
    Alomari, Omar
    ALghazoo, Anood
    2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
  • [5] Detecting High Risk Taxpayers Using Data Mining Techniques
    Rad, Mehdi Samee
    Shahbahrami, Asadollah
    2016 2ND INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS), 2016, : 144 - 148
  • [6] Detecting Internet worms at early stage
    Chen, SG
    Ranka, S
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (10) : 2003 - 2012
  • [7] Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
    Alkasassbeh, Mouhammd
    Al-Naymat, Ghazi
    Hassanat, Ahmad B. A.
    Almseidin, Mohammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 436 - 445
  • [8] Detecting security threats in the network core using Data Mining techniques
    Sandford, P. J.
    Parish, D. J.
    Sandford, J. M.
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 951 - 954
  • [9] Detecting misuse of information retrieval systems using data mining techniques
    Goharian, N
    Ma, L
    Meyers, C
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 604 - 605
  • [10] Detecting Internet Worms, Ransomware, and Blackouts Using Recurrent Neural Networks
    Li, Zhida
    Rios, Ana Laura Gonzalez
    Trajkovic, Ljiljana
    2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 2165 - 2172