Evaluation on malware classification by session sequence of common protocols

0Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent malware is becoming sophisticated year by year. It often uses common protocols like HTTP to imitate normal communications. So, we have to consider activities in common protocols when we analyze malware. Meanwhile, the number of malware analysts is insufficient compared to new malware generation speed. To solve this problem, there is expectation to a malware classification method which classifies huge number malware with quickness and accurate. With this method, malware analysts can dedicate to the investigation of new types of malware. In this paper, we propose a malware classification method using Session Sequence of common protocols which classifies malware into new or existing one. Furthermore, if the malware is classified as existing malware, the proposed method also classifies it into existing malware families. We evaluated our proposed method with traffics of 502 malware samples. The experimental results shows that our method can correctly judge and classify in 84.5% accuracy.

Cite

CITATION STYLE

APA

Hiruta, S., Yamaguchi, Y., Shimada, H., Takakura, H., Yagi, T., & Akiyama, M. (2016). Evaluation on malware classification by session sequence of common protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10052 LNCS, pp. 521–531). Springer Verlag. https://doi.org/10.1007/978-3-319-48965-0_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free