作者
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov
发表日期
2010/3/22
图书
Proceedings of the 2010 ACM symposium on applied computing
页码范围
1978-1984
简介
Hosts infected with malicious software, so called malware, are ubiquitous in today's computer networks. The means whereby malware can infiltrate a network are manifold and range from exploiting of software vulnerabilities to tricking a user into executing malicious code. Monitoring and detection of all possible infection vectors is intractable in practice. Hence, we approach the problem of detecting malicious software at a later point when it initiates contact with its maintainer; a process referred to as "phoning home". In particular, we introduce Botzilla, a method for detection of malware communication, which proceeds by repetitively recording network traffic of malware in a controlled environment and generating network signatures from invariant content patterns. Experiments conducted at a large university network demonstrate the ability of Botzilla to accurately identify malware communication in network traffic with …
引用总数
201020112012201320142015201620172018201920202021202220232024271411146108185108641
学术搜索中的文章
K Rieck, G Schwenk, T Limmer, T Holz, P Laskov - Proceedings of the 2010 ACM symposium on applied …, 2010