DocumentCode :
122668
Title :
Temporal behaviors of Top-10 malware download in 2010–2012
Author :
Yukonhiatou, Chaxiong ; Kittitornkun, Surin ; Kikuchi, Hiroaki ; Sisaat, Khamphao ; Terada, M. ; Ishii, Hiroyuki
Author_Institution :
Int. Coll., King Mongkut´s Inst. of Technol. Ladkrabang, Ladkrabang, Thailand
fYear :
2014
fDate :
19-21 March 2014
Firstpage :
1
Lastpage :
4
Abstract :
Malware can be widely downloaded over the Internet by the bot-infected computers according to their botmaster in order to form a botnet and eventually to perform cyber attacks. This paper analyzes and summarizes the malware download behaviors of Top-10 malware based on 2010 CCC, 2011 CCC and 2012 IIJ MITF datasets. The datasets contain millions of download logs collected from several Honeypots located in Japan observing malware/bot traffic and activities. These log data have been processed and analyzed in terms of daily and hourly downloads based on our Top-10 processing algorithm. As a result, both daily and hourly download patterns in each year are quite different due to different malware families and spreading protocols.
Keywords :
Internet; invasive software; Honeypots; Internet; Top-10 malware download; Top-10 processing algorithm; bot-infected computers; botmaster; botnet; cyber attacks; download logs; spreading protocols; temporal behaviors; Correlation; Educational institutions; Grippers; Internet; Malware; Peer-to-peer computing; Honeypot; botnet; daily; hourly; malware download;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electrical Engineering Congress (iEECON), 2014 International
Conference_Location :
Chonburi
Type :
conf
DOI :
10.1109/iEECON.2014.6925944
Filename :
6925944
Link To Document :
بازگشت