Analysis on the Sequential Behavior of Malware Attacks

被引:0
|
作者
Rosyid, Nur Rohman [1 ]
Ohrui, Masayuki [2 ]
Kikuchi, Hiroaki [2 ]
Sooraksa, Pitikhate [1 ]
Terada, Masato [3 ]
机构
[1] King Mongkuts Inst Technol Ladkrabang, Fac Engn, Bangkok 10520, Thailand
[2] Tokai Univ, Sch Sci & Technol, Hiratsuka, Kanagawa 2591292, Japan
[3] Hitachi Ltd, Hitachi Incident Response Team HIRT, Kawasaki, Kanagawa 2128567, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2011年 / E94D卷 / 11期
关键词
PrefixSpan; malware; botnets; coordinated attack; sequential pattern;
D O I
10.1587/transinf.E94.D.2139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the hots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.
引用
收藏
页码:2139 / 2149
页数:11
相关论文
共 50 条
  • [21] Analysis of Malware-Induced Cyber Attacks in Cyber-Physical Power Systems
    Xu, Sheng
    Xia, Yongxiang
    Shen, Hui-Liang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3482 - 3486
  • [22] Clustering Analysis of Malware Behavior using Self Organizing Map
    Pirscoveanu, Radu-Stefan
    Stevanovic, Matija
    Pedersen, Jens Myrup
    2016 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2016,
  • [23] Analysis of Malware Behavior: Type Classification using Machine Learning
    Pirscoveanu, Radu S.
    Hansen, Steven S.
    Larsen, Thor M. T.
    Stevanovic, Matija
    Pedersen, Jens Myrup
    Czech, Alexandre
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [24] Android malware detection based on static behavior feature analysis
    Chen C.
    Liu Y.
    Shen B.
    Cheng J.-J.
    Journal of Computers (Taiwan), 2018, 29 (06) : 243 - 253
  • [25] Clustering Analysis for Malware Behavior Detection using Registry Data
    Rosli, Nur Adibah
    Mohamed, Warusia
    Faizal, M. A.
    Selamat, Siti Rahayu
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 93 - 102
  • [26] Securing Malware Cognitive Systems against Adversarial Attacks
    Ti, Yuede
    Bowman, Benjamin
    Huang, H. Howie
    2019 IEEE INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING (IEEE ICCC 2019), 2019, : 1 - 9
  • [27] Predicting Malware Attacks using Machine Learning and AutoAI
    Sokolov, Mark
    Herndon, Nic
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION APPLICATIONS AND METHODS (ICPRAM), 2021, : 295 - 301
  • [28] Android Malware Attacks and Countermeasures: Current and Future Directions
    Raveendranath, Rahul
    Rajamani, Venkiteswaran
    Babu, Anoop Joseph
    Datta, Soumya Kanti
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 137 - 143
  • [29] Using Infection Markers as a Vaccine against Malware Attacks
    Wichmann, Andre
    Gerhards-Padilla, Elmar
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 737 - 742
  • [30] A Malware Detection Approach Based on Feature Engineering and Behavior Analysis
    Torres, Manuel
    Alvarez, Rafael
    Cazorla, Miguel
    IEEE ACCESS, 2023, 11 : 105355 - 105367