Detection of unknown computer worms based on behavioral classification of the host

被引:46
|
作者
Moskovitch, Robert [1 ]
Elovici, Yuval [1 ]
Rokach, Lior [1 ]
机构
[1] Ben Gurion Univ Negev, Deutsch Telekom Labs, IL-84105 Beer Sheva, Israel
关键词
D O I
10.1016/j.csda.2008.01.028
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of information security is classification of a computer behavior into malicious and benign. Antiviruses consisting of signature-based methods are helpless against new (unknown) computer worms. This paper focuses on the feasibility of accurately detecting unknown worm activity in individual computers while minimizing the required set of features collected from the monitored computer. A comprehensive experiment for testing the feasibility of detecting unknown computer worms, employing several computer configurations, background applications, and user activity, was performed. During the experiments 323 computer features were monitored by an agent that was developed. Four feature selection methods were used to reduce the number of features and four learning algorithms were applied on the resulting feature subsets. The evaluation results suggest that by using classification algorithms applied on only 20 features the mean detection accuracy exceeded 90%, and for specific unknown worms accuracy reached above 99%, while maintaining a low level of false positive rate. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:4544 / 4566
页数:23
相关论文
共 50 条
  • [31] Design and Implementation of Computer Worms Based on Monitoring Replication and Damage
    Al-Saawy, Yazed B.
    Al Amro, Sulaiman
    [J]. International Journal of Computer Science and Network Security, 2016, 16 (11): : 55 - 65
  • [32] A computational model of computer worms based on persistent turing machines
    Hao, Jingbo
    Yin, Jianping
    Zhang, Boyun
    [J]. PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, VOLS 1 AND 2, 2006, : 453 - 456
  • [33] Three-phase behavior-based detection and classification of known and unknown malware
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    Lu, Chun-Nan
    Hsu, Peng-Kai
    Lee, Chia-Yin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 2004 - 2015
  • [34] Computer aided detection/computer aided classification and data fusion algorithms for automated detection and classification of underwater mines
    Ciany, CM
    Huang, J
    [J]. OCEANS 2000 MTS/IEEE - WHERE MARINE SCIENCE AND TECHNOLOGY MEET, VOLS 1-3, CONFERENCE PROCEEDINGS, 2000, : 277 - 284
  • [35] Anomaly detection enhanced classification in computer intrusion detection
    Fugate, M
    Gattiker, JR
    [J]. PATTERN RECOGNITION WITH SUPPORT VECTOR MACHINES, PROCEEDINGS, 2002, 2388 : 186 - 197
  • [36] Unknown Malware Detection Using Network Traffic Classification
    Bekerman, Dmitri
    Shapira, Bracha
    Rokach, Lior
    Bar, Ariel
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 134 - 142
  • [37] RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM
    Mundlamuri Venkata Rao
    Divya Midhunchakkaravarthy
    Sujatha Dandu
    [J]. Journal of Computer Virology and Hacking Techniques, 2023, 19 : 241 - 255
  • [38] Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM
    Mundlamuri Venkata Rao
    Divya Midhunchakkaravarthy
    Sujatha Dandu
    [J]. Journal of Computer Virology and Hacking Techniques, 2023, 19 : 637 - 637
  • [39] HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android
    Ribeiro, Jose
    Saghezchi, Firooz B.
    Mantas, Georgios
    Rodriguez, Jonathan
    Abd-Alhameed, Raed A.
    [J]. IEEE ACCESS, 2020, 8 : 23154 - 23168
  • [40] Detection algorithm of scanning worms based on similarity analysis
    Huang, Zhi-Yong
    Zhou, Jian-Lin
    Chen, Xin-Long
    Shi, Xing-Li
    [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (05): : 73 - 77