Proceedings of the Ninth ACM International Conference on Web Search and Data Mining 2016
DOI: 10.1145/2835776.2835834
|View full text |Cite
|
Sign up to set email alerts
|

Ensemble Models for Data-driven Prediction of Malware Infections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 22 publications
0
21
0
Order By: Relevance
“…Predicting Security Incidents. Prior work studied the feasibility of predicting future computer-security incidents [34,42,51,69,71,72,76]. Soska and Christin showed that, using publicly available indicators, they could reliably predict whether websites would be compromised within one year [76].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Predicting Security Incidents. Prior work studied the feasibility of predicting future computer-security incidents [34,42,51,69,71,72,76]. Soska and Christin showed that, using publicly available indicators, they could reliably predict whether websites would be compromised within one year [76].…”
Section: Related Workmentioning
confidence: 99%
“…Liu et al demonstrated that one can predict if an enterprise will suffer future security incidents (e.g., server breach), using externally observed indicators (e.g., DNS misconfigurations) [51]. Sabottke et al focused on predicting which vulnerabilities will be exploited using information collected from Twitter feeds [69], while Kang et al proposed to predict what percentage of hosts within a country are likely to be infected by a particular piece of malware [42].…”
Section: Related Workmentioning
confidence: 99%
“…The contact graph is a directed graph with a set of nodes and edges at time t . If there is a network flow between two nodes at that time, an edge is inserted between these nodes in the graph. Altarelli et al have used a certain number of features of propagation characteristics, including the recovery probability for each node, the probability by which two nodes infect each other, the distribution of recovery time, and the transmission delay distribution. In another study, historical diffusion traces were available, and the following features were extracted: which nodes got infected and when did this happen. Zhu et al have defined the following features: the time elapsed before the subnet gets worm duplication, the number of infected hosts in each subnet at a moment, the bandwidth consumed by the worm inside subnet i to attack the outside ( bandwidth _ out ), the bandwidth consumed by the worm outside subnet i to attack the subnet ( bandwidth _ in ), and the bandwidth consumed by the worm inside subnet i to attack the subnet ( bandwidth _ inside ) are used as features. In the previous research, to predict the number of malware infections in a country the following features have been defined: the time when a file becomes infected with a malware, antivirus signature release time, and the patch release time. In another study, 323 features were collected from a monitored computer, which could be classified into the following 11 main categories to detect worm activity in computers: ICMP, IP, memory, network interface, physical disk, process, processor, system, Transport Control Protocol TCP, thread, UDP. In an investigation by Tabish, instructions or call sequences of an executable program have been mapped to a graph. Features were extracted from the constructed graph at the three following levels: vertex level, subgraph level, and graph level.…”
Section: Related Workmentioning
confidence: 99%
“…• Zhu et al 39 have defined the following features: the time elapsed before the subnet gets worm duplication, the number of infected hosts in each subnet at a moment, the bandwidth consumed by the worm inside subnet i to attack the outside (bandwidth_out), the bandwidth consumed by the worm outside subnet i to attack the subnet (bandwidth_in), and the bandwidth consumed by the worm inside subnet i to attack the subnet (bandwidth_inside) are used as features. • In the previous research, 40 to predict the number of malware infections in a country the following features have been defined: the time when a file becomes infected with a malware, antivirus signature release time, and the patch release time.…”
Section: Featuresmentioning
confidence: 99%
“…From our prior research [3,25], we know that ensembles frequently beat vanilla classifiers. As a consequence, we decided to try out ensembles on our data.…”
Section: Ensemble Learningmentioning
confidence: 99%