Malware classification method based on sequence of traffic flow | IEEE Conference Publication | IEEE Xplore

Malware classification method based on sequence of traffic flow


Abstract:

Network-based malware classification plays an important role in improving system security than system-based malware classification. The vast majority of malware needs a n...Show More

Abstract:

Network-based malware classification plays an important role in improving system security than system-based malware classification. The vast majority of malware needs a network activity in order to accomplish its purpose (e.g., downloading malware, connecting to a C&C server, etc.). Many malware classification approaches based on network behavior have thus been proposed. Nevertheless, they merely rely on either a request URL or payload for signature matching. To classify the network activity of malware, the patterns of network behavior must be understood and the changes in behavior observed. Therefore, the sequence of flows and their correlation caused by the malware should be analysed. In this paper, we present a novel malware classification method based on clustering of flow features and sequence alignment algorithms for computing sequence similarity, which represents network behavior of malware. We focus on analysing the sequence similarity between the sequence patterns of malware traffic flow generated by executing malware on the dynamic analysing system. We also performed an evaluation by using malware traffic collected from a real environment. On the basis of our experimental results, we identified the most appropriate method for classifying malware by similarity of network activity.
Date of Conference: 09-11 February 2015
Date Added to IEEE Xplore: 14 July 2016
ISBN Information:
Conference Location: Angers, France

1 Introduction

One of the major security threats on the Internet is malware, i.e., malicious software. According to a report in Q1 2014 by McAfee [McAfee, 2014], the total number of variants of malware in McAfee Labs exceeded 200 million. Security of the Internet systems critically depends on the capability to keep anti-virus software (AVs) up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so fast they cannot be detected by conventional signature-based detection. Furthermore, in contrast to the growing number of malicious codes, the number of analysts is markedly limited. Therefore, malware classification techniques have been proposed as solutions to deal with these problems.

Contact IEEE to Subscribe

References

References is not available for this document.