首页> 外文会议>International Conference on Availability, Reliability and Security >What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware
【24h】

What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware

机译:你的主要威胁是什么?关于有针对性和商品恶意软件的网络行为的差异

获取原文

摘要

This work uses statistical classification techniques to learn about the different network behavior patterns demonstrated by targeted malware and generic malware. Targeted malware is a recent type of threat, involving bespoke software that has been created to target a specific victim. It is considered a more dangerous threat than generic malware, because a targeted attack can cause more serious damage to the victim. Our work aims to automatically distinguish between the network activity generated by the two types of malware, which then allows samples of malware to be classified as being either targeted or generic. For a network administrator, such knowledge can be important because it assists to understand which threats require particular attention. Because a network administrator usually manages more than an alarm simultaneously, the aim of the work is particularly relevant. We set up a sandbox and infected virtual machines with malware, recording all resulting malware activity on the network. Using the network packets produced by the malware samples, we extract features to classify their behavior. Before performing classification, we carefully analyze the features and the dataset to study all their details and gain a deeper understanding of the malware under study. Our use of statistical classifiers is shown to give excellent results in some cases, where we achieved an accuracy of almost 96% in distinguishing between the two types of malware. We can conclude that the network behaviors of the two types of malicious code are very different.
机译:这项工作使用统计分类技术来了解目标恶意软件和通用恶意软件所展示的不同网络行为模式。有针对性的恶意软件是最近的威胁类型,涉及已经创建的定制软件来定位特定受害者。它被认为是比普通恶意软件更危险的威胁,因为目标攻击可能会对受害者造成更严重的伤害。我们的工作旨在自动区分由两种恶意软件产生的网络活动,然后允许恶意软件的样本被分类为目标或通用。对于网络管理员,这些知识可能很重要,因为它有助于了解哪些威胁需要特别注意。由于网络管理员通常同时管理不仅仅是警报,因此工作的目的是特别相关的。我们使用恶意软件设置沙箱和受感染的虚拟机,录制网络上的所有Mallware活动。使用恶意软件示例产生的网络数据包,我们提取特征以对其行为进行分类。在执行分类之前,我们仔细分析了功能和数据集以研究所有细节并获得对研究中恶意软件的更深入了解。我们的使用统计分类器显示在某些情况下,在某些情况下,我们在区分两种恶意软件之间实现了近96%的准确性。我们可以得出结论,两种类型恶意代码的网络行为非常不同。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号