Cross-layer analysis of malware datasets for malicious campaigns identification

作者: Michal Kruczkowski , Ewa Niewiadomska-Szynkiewicz , Adam Kozakiewicz

DOI: 10.1109/ICMCIS.2015.7158682

关键词:

摘要: In this paper, we investigate the problem of detecting correlations among datasets containing malicious data concerned with various types network attacks and related events infections taken from a numerous sources organizations. We propose graph based technique to depict relationships between on values attributes both attackers victims, referred different layers OSI model. The presented model can be used fast, automatic identification malware campaigns. case study described in paper demonstrates performance our method.

参考文章(21)
Krzysztof Lasota, Adam Kozakiewicz, Analysis of the Similarities in Malicious DNS Domain Names FTRA International Conference on Secure and Trust Computing, Data Management, and Application. pp. 1- 6 ,(2011) , 10.1007/978-3-642-22365-5_1
Muhammad Khalil Shahid, Filmon Debretsion, Aman Eyob, Irfan Ahmed, Tarig Faisal, A Level-Based Approach to Prioritize Telecommunications R&D Journal of telecommunications and information technology. ,vol. 4, pp. 1- 7 ,(2021) , 10.26636/JTIT.2020.146820
Georg Wicherski, peHash: a novel approach to fast malware clustering usenix conference on large scale exploits and emergent threats. pp. 1- 1 ,(2009)
E. Niewiadomska-Szynkiewicz, M. Kruczkowski, Comparative Study of Supervised Learning Methods for Malware Analysis Journal of telecommunications and information technology. ,(2014)
A. Felkner, T. J. Kruk, A. Kozakiewicz, P. Kijowski, Application of bioinformatics methods to recognition of network threats Journal of telecommunications and information technology. pp. 23- 27 ,(2007)
Isabela Liane De Oliveira, André Ricardo Abed Grégio, Adriano Mauro Cansian, None, A malware detection system inspired on the human immune system international conference on computational science and its applications. pp. 286- 301 ,(2012) , 10.1007/978-3-642-31128-4_21
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq, Embedded Malware Detection Using Markov n-Grams international conference on detection of intrusions and malware and vulnerability assessment. pp. 88- 107 ,(2008) , 10.1007/978-3-540-70542-0_5
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov, Learning and Classification of Malware Behavior international conference on detection of intrusions and malware and vulnerability assessment. pp. 108- 125 ,(2008) , 10.1007/978-3-540-70542-0_6
Zulfikar Ramzan, Phishing Attacks and Countermeasures Handbook of Information and Communication Security. pp. 433- 448 ,(2010) , 10.1007/978-3-642-04117-4_23
Michal Kruczkowski, Ewa Niewiadomska Szynkiewicz, Support Vector Machine for Malware Analysis and Classification 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). ,vol. 2, pp. 415- 420 ,(2014) , 10.1109/WI-IAT.2014.127