On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis

被引:3
|
作者
Gardiner, Joseph [1 ]
Nagaraja, Shishir [1 ]
机构
[1] Univ Birmingham, Birmingham B15 2TT, W Midlands, England
来源
SECURITY PROTOCOLS XXII | 2014年 / 8809卷
关键词
Reliability analysis;
D O I
10.1007/978-3-319-12400-1_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware attacks are increasingly popular attack vectors in online crime. As trends and anecdotal evidence show, preventing these attacks, regardless of their opportunistic or targeted nature, has proven difficult: intrusions happen and devices get compromised, even at securityconscious organisations. As a consequence, an alternative line of work has focused on detecting and disrupting the individual steps that follow an initial compromise and that are essential for the successful progression of the attack. In particular, a number of approaches and techniques have been proposed to identify the Command & Control (C2) channel that a compromised system establishes to communicate with its controller. The success of C2 detection approaches depends on collecting relevant network traffic. As traffic volumes increase this is proving increasingly difficult. In this paper, we analyse current approaches of ISP-scale network measurement from the perspective of C2 detection. We discuss a number of weaknesses that affect current techniques and provide suggestions for their improvement.
引用
收藏
页码:321 / 333
页数:13
相关论文
共 50 条
  • [1] On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion)
    Nagaraja, Shishir
    [J]. SECURITY PROTOCOLS XXII, 2014, 8809 : 334 - 339
  • [2] Network Traffic Analysis for Android Malware Detection
    Gaviria de la Puerta, Jose
    Pastor-Lopez, Iker
    Sanz, Borja
    Bringas, Pablo G.
    [J]. HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2019, 2019, 11734 : 468 - 479
  • [3] Malware Detection in Android by Network Traffic Analysis
    Zaman, Mehedee
    Siddiqui, Tazrian
    Amin, Mohammad Rakib
    Hossain, Md Shohrab
    [J]. 2015 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2015, : 183 - 187
  • [4] Analysis of Malware Application Based on Massive Network Traffic
    Gui, Xiaolin
    Liu, Jun
    Chi, Mucong
    Li, Chenyu
    Lei, Zhenming
    [J]. CHINA COMMUNICATIONS, 2016, 13 (08) : 209 - 221
  • [5] Analysis of Malware Application Based on Massive Network Traffic
    Xiaolin Gui
    Jun Liu
    Mucong Chi
    Chenyu Li
    Zhenming Lei
    [J]. China Communications, 2016, 13 (08) : 209 - 221
  • [6] NETWORK TRAFFIC MEASUREMENT AND ANALYSIS
    Mistry, Devang
    Modi, Prasad
    Deokule, Kaustubh
    Patel, Aditi
    Patki, Harshagandha
    Abuzaghleh, Omar
    [J]. 2016 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2016,
  • [7] Malware Network Traffic Classification on the Edge
    Chen, Eric
    Perez-Pons, Alexander
    [J]. 2022 IEEE 19TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2022), 2022, : 754 - 758
  • [8] Different Network Traffic Measurement Techniques - Possibilities and Results
    Kozemcak, Andrej
    Kovacik, Tomas
    [J]. PROCEEDINGS ELMAR-2012, 2012, : 93 - 96
  • [9] Traffic Measurement and Analysis of a Campus Network
    Zhang, Weiyu
    [J]. INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING BIOMEDICAL ENGINEERING, AND INFORMATICS (SPBEI 2013), 2014, : 1164 - 1172
  • [10] Analysis of the Reliability of Methods Used in the Measurement of the Space
    Tenorio, Marilia Martina Guanaany de Oliveira
    de Omena, Bricio Douglas
    da Matta, Edgard Noroes Rodrigues
    [J]. PESQUISA BRASILEIRA EM ODONTOPEDIATRIA E CLINICA INTEGRADA, 2012, 12 (04): : 555 - 560