Analysis on the Sequential Behavior of Malware Attacks
スポンサーリンク
概要
- 論文の詳細を見る
Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the bots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.
- 2011-11-01
著者
-
Terada Masato
Hitachi Incident Response Team (hirt) Hitachi Ltd.
-
Kikuchi Hiroaki
School Of Science And Technology Tokai University
-
Rosyid Nur
Faculty Of Engineering King Mongkut's Institute Of Technology Ladkrabang
-
Ohrui Masayuki
School Of Science And Technology Tokai University
-
Sooraksa Pitikhate
Faculty Of Engineering King Mongkut's Institute Of Technology Ladkrabang
-
Kikuchi Hiroaki
School of Information and Network Engineering, Tokai University
関連論文
- Frequent Sequential Attack Patterns of Malware in Botnets
- Principal Component Analysis of Botnet Takeover
- Estimation of Increase of Scanners Based on ISDAS Distributed Sensors
- Analysis on the Sequential Behavior of Malware Attacks
- Principal Component Analysis of Botnet Takeover
- Perfect Privacy-preserving Automated Trust Negotiation
- Time Zone Correlation Analysis of Malware/Bot Downloads
- Automated Port-scan Classification with Decision Tree and Distributed Sensors
- Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm
- Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm
- Estimation of Increase of Scanners Based on ISDAS Distributed Sensors
- Time Zone Analysis on IIJ Network Traffic for Malicious Botnet Activities