作者
Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi Sandhu
发表日期
2010
研讨会论文
Security and Privacy in Communication Networks: 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings 6
页码范围
20-34
出版商
Springer Berlin Heidelberg
简介
In this paper we address the following questions: From a networking perspective, do malicious programs (malware, bots, viruses, etc...) behave differently from benign programs that run daily for various needs? If so, how may we exploit the differences in network behavior to detect them? To address these questions, we are systematically analyzing the behavior of a large set (at the magnitude of 2,000) of malware samples. We present our initial results after analyzing 1000 malware samples. The results show that malicious and benign programs behave quite differently from a network perspective. We are still in the process of attempting to interpret the differences, which nevertheless have been utilized to detect 31 malware samples which were not detected by any antivirus software on Virustotal.com as of 01 April 2010, giving evidence that the differences between malicious and benign network behavior has …
引用总数
201220132014201520162017201820192020202120222023202443213254131365727231714
学术搜索中的文章
JA Morales, A Al-Bataineh, S Xu, R Sandhu - Security and Privacy in Communication Networks: 6th …, 2010