AutoMal: automatic clustering and signature generation for malwares based on the network flow

被引:1
|
作者
Hao, Sun [1 ,2 ]
Wang, Wen [1 ]
Lu, Huabiao [1 ]
Ren, Peige [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha, Hunan, Peoples R China
[2] Natl Univ Def Technol, Natl Key Lab Parallel & Distributed Proc, Changsha, Hunan, Peoples R China
基金
美国国家科学基金会; 国家高技术研究发展计划(863计划);
关键词
network malware; clustering; signature generation; matrix; feature hashing;
D O I
10.1002/sec.1029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The volume of malwares is growing at an exponential speed nowadays. This huge growth makes it extremely hard to analyse malware manually. Most existing signatures extracting methods are based on string signatures, and string matching is not accurate and time consuming. Therefore, this paper presents AutoMal, a system for automatically extracting signatures from large-scale malwares. Firstly, the system proposes to represent the network flows by using feature hashing, which can dramatically reduce the high-dimensional feature spaces that are general in malware analysis. Then, we design a clustering and median filtering method to classify the malware vectors into different types. Finally, it introduces the signature generation algorithm based on Bayesian method. The system can extract both the byte signature and the hash signature of malwares from its network flow with low false positive and zero false negative. Our evaluation shows that AutoMal can generate strongly noise-resisted signatures that exactly depict the characteristics of malware. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1845 / 1854
页数:10
相关论文
共 50 条
  • [1] Hierarchical Network Signature Clustering and Generation
    Choi, Sunoh
    Lee, Jooyoung
    Choi, Yangseo
    Kim, Jonghyun
    Kim, Ikkyun
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 1191 - 1193
  • [2] FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors
    Rafique, M. Zubair
    Caballero, Juan
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 144 - 163
  • [3] Automatic Worm Signature Generation Based on Vulnerability
    Zhang Chunhua
    Guo Shanqing
    Cui Lizheng
    Xu Qiuliang
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 83 - 86
  • [5] On the Feasibility of Automatic Malware Family Signature Generation
    Zhang, Xiao
    Xu, Zhi
    PROCEEDINGS OF THE FIRST WORKSHOP ON RADICAL AND EXPERIENTIAL SECURITY (RESEC'18), 2018, : 69 - 72
  • [6] Cluster-Based News Representative Generation with Automatic Incremental Clustering
    Shabirin, Irsal
    Barakbah, Ali Ridho
    Syarif, Iwan
    EMITTER-INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGY, 2019, 7 (02) : 467 - 479
  • [7] Automatic Attack Signature Generation Systems: A Review
    Kaur, Sanmeet
    Singh, Maninder
    IEEE SECURITY & PRIVACY, 2013, 11 (06) : 54 - 61
  • [8] Automatic Generation of Merge Factor for Clustering Microarray Data
    Pavan, K. Karteeka
    Rao, Allam Appa
    Rao, A. V. Dattatreya
    Sridhar, G. R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (09): : 127 - 131
  • [9] Flow Simulation Based Energy Efficient Clustering in Wireless Sensor Network
    Jiang, Yi
    Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications, 2016, 71 : 8 - 13
  • [10] Automatic Attack Signature Generation Technology for Malicious Java']JavaScript
    Yoon, Soojin
    Jung, JongHun
    Noh, MyoungSun
    Chung, Kyungho
    Im, ChaeTae
    2014 PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION & CONTROL (ICMIC), 2014, : 351 - 354