Analysis on the Sequential Behavior of Malware Attacks

被引:0
|
作者
Rosyid, Nur Rohman [1 ]
Ohrui, Masayuki [2 ]
Kikuchi, Hiroaki [2 ]
Sooraksa, Pitikhate [1 ]
Terada, Masato [3 ]
机构
[1] King Mongkuts Inst Technol Ladkrabang, Fac Engn, Bangkok 10520, Thailand
[2] Tokai Univ, Sch Sci & Technol, Hiratsuka, Kanagawa 2591292, Japan
[3] Hitachi Ltd, Hitachi Incident Response Team HIRT, Kawasaki, Kanagawa 2128567, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2011年 / E94D卷 / 11期
关键词
PrefixSpan; malware; botnets; coordinated attack; sequential pattern;
D O I
10.1587/transinf.E94.D.2139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the hots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.
引用
收藏
页码:2139 / 2149
页数:11
相关论文
共 50 条
  • [41] EvilModel 2.0: Bringing Neural Network Models into Malware Attacks
    Wang, Zhi
    Liu, Chaoge
    Cui, Xiang
    Yin, Jie
    Wang, Xutong
    COMPUTERS & SECURITY, 2022, 120
  • [42] “VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks
    Marcus Botacin
    Paulo Lício de Geus
    André Grégio
    Journal of Computer Virology and Hacking Techniques, 2019, 15 : 233 - 247
  • [43] Stealth attacks: An extended insight into the obfuscation effects on Android malware
    Maiorca, Davide
    Ariu, Davide
    Corona, Igino
    Aresu, Marco
    Giacinto, Giorgio
    COMPUTERS & SECURITY, 2015, 51 : 16 - 31
  • [44] The rise of "malware": Bibliometric analysis of malware study
    Ab Razak, Mohd Faizal
    Anuar, Nor Badrul
    Salleh, Rosli
    Firdaus, Ahmad
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 58 - 76
  • [45] An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency
    Jadhav, Suyash
    Oh, Tae
    Jeong, Jaehoon
    Kim, Young Ho
    Kim, Jeong Neyo
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 370 - 374
  • [46] An Effective Framework of Behavior Detection-Advanced Static Analysis for Malware Detection
    Louk, Maya
    Lim, Hyotaek
    Lee, HoonJae
    Atiquzzaman, Mohammed
    2014 14th International Symposium on Communications and Information Technologies (ISCIT), 2014, : 361 - 365
  • [47] A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring
    Zolkipli, Mohamad Fadli
    Jantan, Aman
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 1, 2011, 179 : 199 - 209
  • [48] Malware Behavior Ontology for Digital Evidence
    Liu, Jigang
    Kammar, Rashmi
    Sasaki, Ryoichi
    Uehara, Tetsutaro
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 585 - 586
  • [49] A survey of zero-day malware attacks and its detection methodology
    Radhakrishnan, Kiran
    Menon, Rajeev R.
    Nath, Hiran V.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 533 - 539
  • [50] Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks
    Wressnegger, Christian
    Freeman, Kevin
    Yamaguchi, Fabian
    Rieck, Konrad
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 587 - 598