MalPro: A learning-based malware propagation and containment modeling

4Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we investigate the importance of a defense system's learning rates to fight against the self-propagating class of malware such as worms and bots. To this end, we introduce a new propagation model based on the interactions between an adversary (and its agents) who wishes to construct a zombie army of a specific size, and a defender taking advantage of standard security tools and technologies such as honeypots (HPs) and intrusion detection and prevention systems (IDPSes) in the network environment. As time goes on, the defender can incrementally learn from the collected/observed attack samples (e.g., malware payloads), and therefore being able to generate attack signatures. The generated signatures then are used for filtering next attack trafic and thus containing the attacker's progress in its malware propagation mission. Using simulation and numerical analysis, we evaluate the eficacy of signature generation algorithms and in general any learning-based scheme in bringing an adversary's maneuvering in the environment to a halt as an adversarial containment strategy.

Cite

CITATION STYLE

APA

Valizadeh, S., & Van Dijk, M. (2019). MalPro: A learning-based malware propagation and containment modeling. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 45–56). Association for Computing Machinery. https://doi.org/10.1145/3338466.3358920

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free