What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware

Enrico Mariconti, J. Onaolapo, Gordon J. Ross, G. Stringhini
{"title":"What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware","authors":"Enrico Mariconti, J. Onaolapo, Gordon J. Ross, G. Stringhini","doi":"10.1109/ARES.2016.36","DOIUrl":null,"url":null,"abstract":"This work uses statistical classification techniques to learn about the different network behavior patterns demonstrated by targeted malware and generic malware. Targeted malware is a recent type of threat, involving bespoke software that has been created to target a specific victim. It is considered a more dangerous threat than generic malware, because a targeted attack can cause more serious damage to the victim. Our work aims to automatically distinguish between the network activity generated by the two types of malware, which then allows samples of malware to be classified as being either targeted or generic. For a network administrator, such knowledge can be important because it assists to understand which threats require particular attention. Because a network administrator usually manages more than an alarm simultaneously, the aim of the work is particularly relevant. We set up a sandbox and infected virtual machines with malware, recording all resulting malware activity on the network. Using the network packets produced by the malware samples, we extract features to classify their behavior. Before performing classification, we carefully analyze the features and the dataset to study all their details and gain a deeper understanding of the malware under study. Our use of statistical classifiers is shown to give excellent results in some cases, where we achieved an accuracy of almost 96% in distinguishing between the two types of malware. We can conclude that the network behaviors of the two types of malicious code are very different.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference on Availability, Reliability and Security (ARES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2016.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

This work uses statistical classification techniques to learn about the different network behavior patterns demonstrated by targeted malware and generic malware. Targeted malware is a recent type of threat, involving bespoke software that has been created to target a specific victim. It is considered a more dangerous threat than generic malware, because a targeted attack can cause more serious damage to the victim. Our work aims to automatically distinguish between the network activity generated by the two types of malware, which then allows samples of malware to be classified as being either targeted or generic. For a network administrator, such knowledge can be important because it assists to understand which threats require particular attention. Because a network administrator usually manages more than an alarm simultaneously, the aim of the work is particularly relevant. We set up a sandbox and infected virtual machines with malware, recording all resulting malware activity on the network. Using the network packets produced by the malware samples, we extract features to classify their behavior. Before performing classification, we carefully analyze the features and the dataset to study all their details and gain a deeper understanding of the malware under study. Our use of statistical classifiers is shown to give excellent results in some cases, where we achieved an accuracy of almost 96% in distinguishing between the two types of malware. We can conclude that the network behaviors of the two types of malicious code are very different.
你的主要威胁是什么?论针对性恶意软件与商品恶意软件网络行为的区别
这项工作使用统计分类技术来了解目标恶意软件和通用恶意软件所展示的不同网络行为模式。目标恶意软件是最近出现的一种威胁类型,涉及针对特定受害者创建的定制软件。它被认为是比一般恶意软件更危险的威胁,因为有针对性的攻击会对受害者造成更严重的损害。我们的工作旨在自动区分由两种类型的恶意软件产生的网络活动,然后允许恶意软件样本被分类为目标或通用。对于网络管理员来说,这些知识可能很重要,因为它有助于了解需要特别注意的威胁。由于网络管理员通常同时管理多个警报,因此工作的目的特别相关。我们设置了一个沙箱,用恶意软件感染虚拟机,记录网络上所有恶意软件的活动。利用恶意软件样本产生的网络数据包,提取特征对其行为进行分类。在进行分类之前,我们仔细分析特征和数据集,研究它们的所有细节,并对所研究的恶意软件有更深入的了解。我们使用的统计分类器在某些情况下显示出极好的结果,在区分两种类型的恶意软件方面,我们达到了近96%的准确率。我们可以得出结论,这两种类型的恶意代码的网络行为是非常不同的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信