Analyzing malware log files for internet access investigation using Hadoop

作者: Mohd. Sharudin , Mat Deli

DOI:

关键词: Computer securityFile sizeBotnetComputer scienceBig dataMalwareInternet accessThe InternetAdwareSoftware system

摘要: On the Internet, malicious software (malware) is one of most serious threats to system security. Major complex issues and problems on any systems are frequently caused by malware. Malware can infect computer that has connection Internet infrastructure. There many types malware some popular malwares botnet, trojans, viruses, spyware adware. users with lesser knowledge susceptible this issue. To protect prevent internet from exposing themselves towards attacks, identifying attacks through investigating log file an essential step curb threat. The exposes crucial information in malware, such as algorithm functional characteristic, network interaction between source destination, type By nature, size humongous requires investigation process be executed faster stable platform big data environment. In study, authors had adopted Hadoop, open framework extract files obtains university’s security equipment. Python program was used for transformation then analysis it Hadoop simulation includes assessing reduction size, performance execution time visualization using Microsoft Power BI (Business Intelligence). results processing have reduced 50% original while total would not increase linearly data. will further prevention protection network.

参考文章(71)
Yoseba K. Penya, Jaime Devesa, Pablo García Bringas, Xabier Cantero, Igor Santos, Automatic Behaviour-based Analysis and Classification System for Malware Detection. international conference on enterprise information systems. pp. 395- 399 ,(2010)
Mohd Rehan Ghazi, Durgaprasad Gangodkar, Hadoop, MapReduce and HDFS: A Developers Perspective☆ Procedia Computer Science. ,vol. 48, pp. 45- 50 ,(2015) , 10.1016/J.PROCS.2015.04.108
Can Uzunkaya, Tolga Ensari, Yusuf Kavurucu, Hadoop Ecosystem and Its Analysis on Tweets Procedia - Social and Behavioral Sciences. ,vol. 195, pp. 1890- 1897 ,(2015) , 10.1016/J.SBSPRO.2015.06.429
Panayiotis Mavrommatis, Niels Provos, Dean McNamee, Nagendra Modadugu, Ke Wang, The ghost in the browser analysis of web-based malware conference on workshop on hot topics in understanding botnets. pp. 4- 4 ,(2007)
Hemant Hingave, Rasika Ingle, An approach for MapReduce based log analysis using Hadoop 2015 2nd International Conference on Electronics and Communication Systems (ICECS). pp. 1264- 1268 ,(2015) , 10.1109/ECS.2015.7124788
L.P. Gaspary, C. Melchiors, F.E. Locatelli, F. Dillenburg, Identification of intrusion scenarios through classification, characterization and analysis of firewall events local computer networks. pp. 327- 334 ,(2004) , 10.1109/LCN.2004.65
Kazunori Kamiya, Kazufumi Aoki, Kensuke Nakata, Toru Sato, Hiroshi Kurakami, Masaki Tanikawa, The method of detecting malware-infected hosts analyzing firewall and proxy logs asia pacific symposium on information and telecommunication technologies. pp. 1- 3 ,(2015) , 10.1109/APSITT.2015.7217113
Eric Filiol, Viruses and Malware Handbook of Information and Communication Security. pp. 747- 769 ,(2010) , 10.1007/978-3-642-04117-4_34
K. Sudheer Reddy, M. Kantha Reddy, V. Sitaramulu, An effective data preprocessing method for Web Usage Mining international conference on information communication and embedded systems. pp. 7- 10 ,(2013) , 10.1109/ICICES.2013.6508197
Sherly Abraham, InduShobha Chengalur-Smith, An overview of social engineering malware: Trends, tactics, and implications Technology in Society. ,vol. 32, pp. 183- 196 ,(2010) , 10.1016/J.TECHSOC.2010.07.001