A discovery of sequential attack patterns of malware in botnets

12Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

More than 90 independent honeypots have observed malware traffic at the Japanese tier-1 backbone. Typical attacks were made by multiple servers, coordinating to send many kinds of malware. T his paper aims to discover some frequent new sequential attack patterns of malware. It is not easy to identify particular patterns logs of one year because the volume of dataset is too large to investigate one by one. To overcome the problem, this paper proposes data mining algorithm, the PrejixSpan method. We implement the PrejixSpan algorithm to analyze the malware footprints and show the experimental result. The result of analysis shows that the attacks are performed by multiple sequential attack patterns within a short amount of time. ©2010 IEEE.

Cite

CITATION STYLE

APA

Rosyid, N. R., Ohrui, M., Kikuchi, H., Sooraksa, P., & Terada, M. (2010). A discovery of sequential attack patterns of malware in botnets. In Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics (pp. 2564–2570). https://doi.org/10.1109/ICSMC.2010.5641914

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free