Title :
Retrospective Detection of Malware Attacks by Cloud Computing
Author :
Liu, Shun-Te ; Chen, Yi-Ming
Author_Institution :
Dept. of Inf. Manage., Nat. Central Univ., Taoyuan, Taiwan
Abstract :
As malware becomes pervasive and fast-evolving on the Internet, every computer linking to the outer world faces the risks of malware attacks. Therefore, it is important to not only detect malware as early as possible but also to determine which computer has been attacked. Among the various methods to find and trace the existence of malware, retrospective detection is promising one. Once a threat is identified, it allows one to determine exactly which host or users open similar files by searching historical information. In the past, the huge volume of historical information represents an insurmountable barrier to such traces. Fortunately, with the evolution of cloud computing technologies, this barrier can be broken. In this paper, we propose a new retrospective detection approach based on Portable Executable (PE) format file relationships. We implement our system in a Hadoop platform and use 18 real-world malware to do effective and efficient tests. Our results show that our system has a higher detection rate as well as a lower false positive rate than the famous Splunk tool. We also find that, although cloud computing is suitable for processing a small number of huge files, it has shortcomings in dealing with a large number of small files.
Keywords :
Internet; file organisation; invasive software; query processing; ubiquitous computing; vectors; Hadoop platform; Internet; Splunk tool; cloud computing; file processing; portable executable format file relationship; retrospective malware attack detection; Cloud computing; Computers; Indexing; Malware; Monitoring; Portable document format; Hadoop; cloud computing; malware; retrospective detection;
Conference_Titel :
Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2010 International Conference on
Conference_Location :
Huangshan
Print_ISBN :
978-1-4244-8434-8
Electronic_ISBN :
978-0-7695-4235-5
DOI :
10.1109/CyberC.2010.99