DocumentCode :
138455
Title :
Inferring Malware Family through Application Protocol Sequences Signature
Author :
Boukhtouta, Abdeslem ; Lakhdari, Nour-Eddine ; Debbabi, Mourad
Author_Institution :
Concordia Inst. for Inf. Syst. Eng., Nat. Cyber Forensics & Training Alliance Canada, Montreal, QC, Canada
fYear :
2014
fDate :
March 30 2014-April 2 2014
Firstpage :
1
Lastpage :
5
Abstract :
The dazzling emergence of cyber-threats exert today´s cyberspace, which needs practical and efficient capabilities for malware traffic detection. In this paper, we propose an extension to an initial research effort, namely, towards fingerprinting malicious traffic by putting an emphasis on the attribution of maliciousness to malware families. The proposed technique in the previous work establishes a synergy between automatic dynamic analysis of malware and machine learning to fingerprint badness in network traffic. Machine learning algorithms are used with features that exploit only high-level properties of traffic packets (e.g. packet headers). Besides, the detection of malicious packets, we want to enhance fingerprinting capability with the identification of malware families responsible in the generation of malicious packets. The identification of the underlying malware family is derived from a sequence of application protocols, which is used as a signature to the family in question. Furthermore, our results show that our technique achieves promising malware family identification rate with low false positives.
Keywords :
computer network security; invasive software; learning (artificial intelligence); application protocol sequences signature; cyber-threats; machine learning algorithm; malicious packets detection; malware automatic dynamic analysis; malware traffic detection; network traffic; Cryptography; Databases; Engines; Feeds; Malware; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on
Conference_Location :
Dubai
Type :
conf
DOI :
10.1109/NTMS.2014.6814026
Filename :
6814026
Link To Document :
بازگشت