Detection of unknown computer worms based on behavioral classification of the host

被引:46
|
作者
Moskovitch, Robert [1 ]
Elovici, Yuval [1 ]
Rokach, Lior [1 ]
机构
[1] Ben Gurion Univ Negev, Deutsch Telekom Labs, IL-84105 Beer Sheva, Israel
关键词
D O I
10.1016/j.csda.2008.01.028
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of information security is classification of a computer behavior into malicious and benign. Antiviruses consisting of signature-based methods are helpless against new (unknown) computer worms. This paper focuses on the feasibility of accurately detecting unknown worm activity in individual computers while minimizing the required set of features collected from the monitored computer. A comprehensive experiment for testing the feasibility of detecting unknown computer worms, employing several computer configurations, background applications, and user activity, was performed. During the experiments 323 computer features were monitored by an agent that was developed. Four feature selection methods were used to reduce the number of features and four learning algorithms were applied on the resulting feature subsets. The evaluation results suggest that by using classification algorithms applied on only 20 features the mean detection accuracy exceeded 90%, and for specific unknown worms accuracy reached above 99%, while maintaining a low level of false positive rate. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:4544 / 4566
页数:23
相关论文
共 50 条
  • [1] Detection of unknown computer worms activity based on computer Behavior using data mining
    Moskovitch, Robert
    Gus, Ido
    Pluderman, Shay
    Stopel, Dima
    Glezer, Chanan
    Shahar, Yuval
    Elovici, Yuval
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN SECURITY AND DEFENSE APPLICATIONS, 2007, : 169 - +
  • [2] Detection of unknown computer worms activity based on computer Behavior using data mining
    Moskovitch, Robert
    Gus, Ido
    Pluderman, Shay
    Stopel, Dima
    Feher, Clint
    Glezer, Chanan
    Shahar, Yuval
    Elovici, Yuval
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 202 - 209
  • [3] Improving the detection of unknown computer worms activity using active learning
    Moskovitch, Robert
    Nissim, Nir
    Stopel, Dima
    Feher, Clint
    Englert, Roman
    Elovici, Yuval
    [J]. KI 2007: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4667 : 489 - +
  • [4] The Unknown Computer Viruses Detection Based on Similarity
    Liu, Zhongda
    Nakaya, Naoshi
    Koui, Yuuji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 190 - 196
  • [5] Using artificial neural networks to detect unknown computer worms
    Stopel, Dima
    Moskovitch, Robert
    Boger, Zvi
    Shahar, Yuval
    Elovici, Yuval
    [J]. NEURAL COMPUTING & APPLICATIONS, 2009, 18 (07): : 663 - 674
  • [6] Using artificial neural networks to detect unknown computer worms
    Dima Stopel
    Robert Moskovitch
    Zvi Boger
    Yuval Shahar
    Yuval Elovici
    [J]. Neural Computing and Applications, 2009, 18 : 663 - 674
  • [7] A Novel Anomaly Detection Algorithm and Prewarning Technology of Unknown Worms
    Tong, XiaoJun
    Wang, Zhu
    [J]. HIGH PERFORMANCE NETWORKING, COMPUTING, AND COMMUNICATION SYSTEMS, 2011, 163 : 164 - 171
  • [8] Analysis and detection of computer viruses and worms: An annotated bibliography
    Singh, PK
    Lakhotia, A
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (02) : 29 - 35
  • [9] Proactive Detection of Computer Worms Using Model Checking
    Kinder, Johannes
    Katzenbeisser, Stefan
    Schallhart, Christian
    Veith, Helmut
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (04) : 424 - 438
  • [10] Computer Worms: Architectures, Evasion Strategies, and Detection Mechanisms
    Smith, Craig
    Matrawy, Ashraf
    Chow, Stanley
    Abdelaziz, Bassem
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (01): : 69 - 83