2019
DOI: 10.1145/3308897.3308961
|View full text |Cite
|
Sign up to set email alerts
|

MalAlert

Abstract: In recent years, we witness the spreading of a significant variety of malware, which operate and propagate relying on network communications. Due to the staggering growth of traffic in the last years, detecting malicious software has become infeasible on a packet-by-packet basis. In this paper, we address this challenge by investigating malware behaviors and designing a method to detect them relying only on network flow-level data. In our analysis we identify malware types with regards to their impact on a net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(4 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Combined flow-and packetbased approaches were introduced for malware family classification [48,49]. Pure flow-based systems have been successful in detecting malware-related activities [50,51,52] like botnets [53,54,55], DoS attacks [56,57,58], scans [59,60,61] and worms [62,63]. Similarly, our work is based on NetFlow, but we introduce novel features specialized for mining detection.…”
Section: Related Workmentioning
confidence: 99%
“…Combined flow-and packetbased approaches were introduced for malware family classification [48,49]. Pure flow-based systems have been successful in detecting malware-related activities [50,51,52] like botnets [53,54,55], DoS attacks [56,57,58], scans [59,60,61] and worms [62,63]. Similarly, our work is based on NetFlow, but we introduce novel features specialized for mining detection.…”
Section: Related Workmentioning
confidence: 99%
“…This means that given a current flow it is not possible to know in advance where the next one starts. Typically this is not a problem in the context of network security analysis since the way to process flows is to sequentially traverse each one to get to the ones of interest [29], or to build more complex network behavior profiles [27]. However, if CompactFlow is used in a network administration context, the types of workflows could require running the same queries to extract flows with a fixed set of parameters (e.g.…”
Section: Compactflow File Headermentioning
confidence: 99%
“…Though most of the malwares have network activity while performing attacks, the malwares that corrupt the network systems and exploit network protocols are termed as network malwares. The damage caused by these malwares to the network system, resources, and node systems point out the need for early detection, which includes identification, analysis and mitigation mechanisms [2][3].…”
Section: Introductionmentioning
confidence: 99%