Analysis on the Sequential Behavior of Malware Attacks

被引:0
|
作者
Rosyid, Nur Rohman [1 ]
Ohrui, Masayuki [2 ]
Kikuchi, Hiroaki [2 ]
Sooraksa, Pitikhate [1 ]
Terada, Masato [3 ]
机构
[1] King Mongkuts Inst Technol Ladkrabang, Fac Engn, Bangkok 10520, Thailand
[2] Tokai Univ, Sch Sci & Technol, Hiratsuka, Kanagawa 2591292, Japan
[3] Hitachi Ltd, Hitachi Incident Response Team HIRT, Kawasaki, Kanagawa 2128567, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2011年 / E94D卷 / 11期
关键词
PrefixSpan; malware; botnets; coordinated attack; sequential pattern;
D O I
10.1587/transinf.E94.D.2139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the hots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.
引用
收藏
页码:2139 / 2149
页数:11
相关论文
共 50 条
  • [1] A Discovery of Sequential Attack Patterns of Malware in Botnets
    Rosyid, Nur Rohman
    Ohrui, Masayuki
    Kikuchi, Hiroaki
    Sooraksa, Pitikhate
    Terada, Masato
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [2] A Survey on Adversarial Attacks for Malware Analysis
    Aryal, Kshitiz
    Gupta, Maanak
    Abdelsalam, Mahmoud
    Kunwar, Pradip
    Thuraisingham, Bhavani
    IEEE ACCESS, 2025, 13 : 428 - 459
  • [3] MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining
    Nawaz, M. Saqib
    Fournier-Viger, Philippe
    Nawaz, M. Zohaib
    Chen, Guoting
    Wu, Youxi
    COMPUTERS & SECURITY, 2022, 118
  • [4] Behavior Abstraction in Malware Analysis
    Beaucamps, Philippe
    Gnaedig, Isabelle
    Marion, Jean-Yves
    RUNTIME VERIFICATION, 2010, 6418 : 168 - 182
  • [5] A Functional Model and Analysis of Next Generation Malware Attacks and Defenses
    Pu, Calton
    Wang, Qingyang
    Kanemasa, Yasuhiko
    Lima, Rodrigo Alves
    Kimball, Joshua
    Zhang, Shungeng
    Liu, Jianshu
    Gu, Xuhang
    2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 197 - 206
  • [6] Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites
    Yagi, Takeshi
    Murayama, Junichi
    Hariu, Takeo
    Tsugawa, Sho
    Ohsaki, Hiroyuki
    Murata, Masayuki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2014, E97B (01) : 76 - 86
  • [7] Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study
    Kara, Ilker
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (06) : 1253 - 1270
  • [8] Analysis and Forensics for Behavior Characteristics of Malware in Internet
    Ren Ping
    Liu Wu
    Sun Donghong
    Wu Jian-Ping
    Liu Ke
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [9] On the Feasibility of Malware Attacks in Smartphone Platforms
    Mylonas, Alexios
    Dritsas, Stelios
    Tsoumas, Bill
    Gritzalis, Dimitris
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 217 - 232
  • [10] Analysis and Forensics for Behavior Characteristics of Malware in Internet
    Liu Wu
    Ren Ping
    Liu Ke
    Li Xing
    Wu Jian-ping
    Liu Ke
    2016 IEEE INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2016, : 545 - 549