Analyzing and exploiting network behaviors of malware

17Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we address the following questions: From a networking perspective, do malicious programs (malware, bots, viruses, etc⋯) behave differently from benign programs that run daily for various needs? If so, how may we exploit the differences in network behavior to detect them? To address these questions, we are systematically analyzing the behavior of a large set (at the magnitude of 2,000) of malware samples. We present our initial results after analyzing 1000 malware samples. The results show that malicious and benign programs behave quite differently from a network perspective. We are still in the process of attempting to interpret the differences, which nevertheless have been utilized to detect 31 malware samples which were not detected by any antivirus software on Virustotal.com as of 01 April 2010, giving evidence that the differences between malicious and benign network behavior has a possible use in helping stop zero-day attacks on a host machine.© Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2010.

Cite

CITATION STYLE

APA

Morales, J. A., Al-Bataineh, A., Xu, S., & Sandhu, R. (2010). Analyzing and exploiting network behaviors of malware. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 50 LNICST, pp. 20–34). https://doi.org/10.1007/978-3-642-16161-2_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free