Malware behavior analysis in isolated miniature network for revealing malware's network activity

被引:10
作者
Inoue, Daisuke [1 ]
Yoshioka, Katsunari [1 ]
Eto, Masashi [1 ]
Hoshizawa, Yuji [2 ]
Nakao, Koji [1 ]
机构
[1] Natl Inst Informat & Commun Technol, 4-2-1 Nukuikitamachi, Koganei, Tokyo 1848795, Japan
[2] SecureBrain Corp, Tokyo, Tokyo 1020083, Japan
来源
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13 | 2008年
关键词
malware; behavior analysis; miniature network;
D O I
10.1109/ICC.2008.330
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware, such as computer viruses, worms, and bots, has been recognized as one of the major security threats in the Internet environment, and a large amount of research and development is taking place to find effective countermeasures. These countermeasures are mainly based on either macroscopic or microscopic analysis. Macroscopic analysis is based on monitoring the network in order to grasp the global trends of malware propagations while microscopic analysis investigates malware executables to identify the details of how they behave. We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter), where both kinds of analysis are highly integrated. By integrating and correlating the results from the both two approaches, the nicter binds phenomena, i.e., scans observed by network monitoring with their root causes, i.e., malwares. Previous analysis of malware has mainly focused on their internal behavior in the system. However, in order to achieve such a goal, it is crucial that the microscopic analysis extracts a malware's external behavior towards the network. We propose a novel way to analyze malware behavior: focus closely on the malware's external behavior. A malware sample is executed on a real machine that is connected to a virtual Internet environment called a "miniature network". Since this analysis environment is totally isolated from the real Internet, the execution of the sample, unlike in previously proposed methods, causes no further unwanted propagation. Furthermore, the behavioral analysis is carried out in two passes. In the first pass, in order to extract a wider variety of network behaviors from the sample, the miniature network responds as interactively as possible. In the second pass, to make only suitable response that will enable us to concentrate on specific behavior, namely scan behaviors, the miniature network is configured on the basis of the first pass result. We also present concrete analysis results that are gained by using the proposed method.
引用
收藏
页码:1715 / +
页数:2
相关论文
共 13 条
  • [1] Baecher P, 2006, LECT NOTES COMPUT SC, V4219, P165
  • [2] BAILEY M, 2005, 12 ANN NETW DISTR SY
  • [3] Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
  • [4] Father H., 2004, CODEBREAKERS J, V1
  • [5] *IT SEC CTR, INF TECHN PROM AG
  • [6] Kruegel C., 2006, P 15 EUR I COMP ANT, V4
  • [7] MOORE D, 2003, 17 LARG INST SYST AD
  • [8] Nakao K., 2007, 2 JOINT WORKSH INF S, P267
  • [9] Nakao K., 2006, 1 JOINT WORKSH INF S, P363
  • [10] POUGET F, 2005, LEURRE COM ADV DEPLO