Analysis on the Sequential Behavior of Malware Attacks

被引:0
|
作者
Rosyid, Nur Rohman [1 ]
Ohrui, Masayuki [2 ]
Kikuchi, Hiroaki [2 ]
Sooraksa, Pitikhate [1 ]
Terada, Masato [3 ]
机构
[1] King Mongkuts Inst Technol Ladkrabang, Fac Engn, Bangkok 10520, Thailand
[2] Tokai Univ, Sch Sci & Technol, Hiratsuka, Kanagawa 2591292, Japan
[3] Hitachi Ltd, Hitachi Incident Response Team HIRT, Kawasaki, Kanagawa 2128567, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2011年 / E94D卷 / 11期
关键词
PrefixSpan; malware; botnets; coordinated attack; sequential pattern;
D O I
10.1587/transinf.E94.D.2139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the hots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.
引用
收藏
页码:2139 / 2149
页数:11
相关论文
共 50 条
  • [31] A Defensive Strategy Against Android Adversarial Malware Attacks
    Atedjio, Fabrice Setephin
    Lienou, Jean-Pierre
    Nelson, Frederica F.
    Shetty, Sachin S.
    Kamhoua, Charles A.
    IEEE ACCESS, 2024, 12 : 169432 - 169441
  • [32] A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead
    Selvaganapathy S.G.
    Sadasivam S.
    Ravi V.
    Journal of Cyber Security and Mobility, 2021, 10 (01): : 177 - 230
  • [33] Analysis of Malware Behavior: Type Classification using Machine Learning
    Pirscoveanu, Radu S.
    Hansen, Steven S.
    Larsen, Thor M. T.
    Stevanovic, Matija
    Pedersen, Jens Myrup
    Czech, Alexandre
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [34] Mobile malware attacks: Review, taxonomy & future directions
    Qamar, Attia
    Karim, Ahmad
    Chang, Victor
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 887 - 909
  • [35] A survey on malware attacks in industrial air-gap systemsA survey on malware attacks...Md. A. Hussain et al.
    Md Asdaque Hussain
    Khouloud Samrouth
    Nader Bakir
    International Journal of Information Security, 2025, 24 (3)
  • [36] Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization
    Jansen, Jurjen
    Leukfeldt, Rutger
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2016, 10 (01): : 79 - 91
  • [37] Malware Diffusion Behavior Analysis in the Internet and its Immune Protection Strategies
    Xiao, Renbin
    Gong, Xiaoguang
    Yu, Tongyang
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [38] Android Malware Network Behavior Analysis at HTTP Protocol Packet Level
    Wang, Shanshan
    Hou, Shifeng
    Zhang, Lei
    Chen, Zhenxiang
    Han, Hongbo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 497 - 507
  • [39] "VANILLA" malware: vanishing antiviruses by interleaving layers and layers of attacks
    Botacin, Marcus
    de Geus, Paulo Licio
    Gregio, Andre
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (04) : 233 - 247
  • [40] Detection and Prevention System against Cyber Attacks and Botnet Malware for Information Systems and Internet of Things
    Indre, Ionut
    Lemnaru, Camelia
    2016 IEEE 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2016, : 175 - 182