DocumentCode
3757124
Title
Instruction Clustering Analysis for Network Protocol´s Abnormal Behavior
Author
Yanjing Hu;Liaojun Pang;Qingqi Pei;Xu An Wang
Author_Institution
State Key Lab. of Integrated Services Networks, Xidian Univ., Xi´an, China
fYear
2015
Firstpage
791
Lastpage
794
Abstract
Protocol´s abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols´ behavior instruction sequences. All kinds of executed or unexecuted instruction sequences can automatic clustering by our designed instruction clustering algorithm. Thereby we can distinguish and mine the unknown protocols´ potential abnormal behavior. The mined potential abnormal behavior instruction sequences are executed, monitored and analyzed on HiddenDisc to determine whether it is an abnormal behavior and the behavior nature. Using the instruction clustering algorithm, we have analyzed 1297 protocol samples, mined 193 potential abnormal instruction sequences, and determined 187 malicious abnormal behaviors by regression testing. Experimental results show that our proposed instruction clustering algorithm has high efficiency and accuracy, can effectively mine unknown protocols´ abnormal behaviors, and enhance the initiative defense capability of network security.
Keywords
"Protocols","Monitoring","Data mining","Malware","Semantics","Binary codes"
Publisher
ieee
Conference_Titel
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015 10th International Conference on
Type
conf
DOI
10.1109/3PGCIC.2015.69
Filename
7424669
Link To Document