A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet

作者: Jukka Ruohonen , Sanja Scepanovic , Sami Hyrynsalmi , Igor Mishkovski , Tuomas Aura

DOI: 10.1109/EISIC.2016.037

关键词: PopularityThe InternetWorld Wide WebBig dataComputer scienceTheoretical definitionOpen dataWeb crawlerMalwareSnapshot (computer storage)

摘要: This short empirical paper investigates a snapshot of about two million files from continuously updated big data collection maintained by F-Secure for security intelligence purposes. By further augmenting the with open covering half files, examines questions: (a) what is shape probability distribution characterizing relative share malware to all distributed web-facing Internet domains, and (b) shaping popularity files? A bimodal proposed as an answer former question, while graph theoretical definition concept indicates long-tailed, extreme value distribution. With these questions – answers thereto, contributes attempts understand large-scale characteristics at grand population level whole Internet.

参考文章(13)
M. Boukhtouta, A., Mouheb, D., Debbabi, M., Alfandi, O., Iqbal, F. and El Barachi, Graph-theoretic characterization of cyber-threat infrastructures Digital Investigation. ,vol. 14, ,(2015) , 10.1016/J.DIIN.2015.05.002
Jakob Fritz, Corrado Leita, Michalis Polychronakis, Server-Side Code Injection Attacks: A Historical Perspective recent advances in intrusion detection. pp. 41- 61 ,(2013) , 10.1007/978-3-642-41284-4_3
Antonio Nappa, M. Zubair Rafique, Juan Caballero, The MALICIA dataset: identification and analysis of drive-by download operations International Journal of Information Security. ,vol. 14, pp. 15- 33 ,(2015) , 10.1007/S10207-014-0248-7
Ephraim Nissan, None, AN OVERVIEW OF DATA MINING FOR COMBATING CRIME Applied Artificial Intelligence. ,vol. 26, pp. 760- 786 ,(2012) , 10.1080/08839514.2012.713309
Chris Grier, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Manufacturing compromise Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 821- 832 ,(2012) , 10.1145/2382196.2382283
Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou, Efficient suspicious URL filtering based on-reputation workshop on information security applications. ,vol. 20, pp. 26- 36 ,(2015) , 10.1016/J.JISA.2014.10.005
Marco Ramilli, Marco Prandini, Always the Same, Never the Same ieee symposium on security and privacy. ,vol. 8, pp. 73- 75 ,(2010) , 10.1109/MSP.2010.64
Z. Zivkovic, F. van der Heijden, Recursive unsupervised learning of finite mixture models IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 26, pp. 651- 656 ,(2004) , 10.1109/TPAMI.2004.1273970
Christian Rossow, Christian Dietrich, Herbert Bos, Large-Scale analysis of malware downloaders international conference on detection of intrusions and malware and vulnerability assessment. pp. 42- 61 ,(2012) , 10.1007/978-3-642-37300-8_3
Andreas Berger, Alessandro D’Alconzo, Wilfried N. Gansterer, Antonio Pescapé, Mining agile DNS traffic using graph analysis for cybercrime detection Computer Networks. ,vol. 100, pp. 28- 44 ,(2016) , 10.1016/J.COMNET.2016.02.009