Two Methods for Detecting Malware

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we present two ways of detecting malware. The first one takes advantage of a platform that we have developed. The platform includes tools for capturing malware, running code in a controlled environment, and analyzing its interactions with external entities. The platform enables us to detect malware based on the observation of its communication behavior. The second approach uses a method for detecting encrypted Skype traffic and classifying Skype service flows such as voice calls, skypeOut, video conferencing, chat, file upload and download in Skype traffic. The method is based on the Statistical Protocol IDentification (SPID) that analyzes statistical values of some traffic attributes. We apply the method to identify malicious traffic-we have successfully detected the propagation of Worm.Win32.Skipi.b that spreads over the Skype messenger by sending infected messages to all Skype contacts on a victim machine. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Korczyński, M., Berger-Sabbatel, G., & Duda, A. (2013). Two Methods for Detecting Malware. In Communications in Computer and Information Science (Vol. 368 CCIS, pp. 95–106). Springer Verlag. https://doi.org/10.1007/978-3-642-38559-9_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free