2012
DOI: 10.1007/978-3-642-31128-4_20
|View full text |Cite
|
Sign up to set email alerts
|

Pinpointing Malicious Activities through Network and System-Level Malware Execution Behavior

Abstract: Abstract. Malicious programs pose a major threat to Internet-connected systems, increasing the importance of studying their behavior in order to fight against them. In this paper, we propose definitions to the different types of behavior that a program can present during its execution. Based on those definitions, we define suspicious behavior as the group of actions that change the state of a target system. We also propose a set of network and system-level dangerous activities that can be used to denote the ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The behavior of any program can be considered as the set of actions it performs during execution; in case of malware, the entire behavior is suspicious, since each of the performed actions may be a step of an infection procedure [8]. Thus, we propose that a given program behaves suspiciously if it presents one or more of the six "events" described below.…”
Section: A Suspicious Behaviormentioning
confidence: 99%
“…The behavior of any program can be considered as the set of actions it performs during execution; in case of malware, the entire behavior is suspicious, since each of the performed actions may be a step of an infection procedure [8]. Thus, we propose that a given program behaves suspiciously if it presents one or more of the six "events" described below.…”
Section: A Suspicious Behaviormentioning
confidence: 99%
“…We based our inference rules and risk values on already defined behaviors extracted from malware captured in the wild. Most of these behaviors (and the associated rules derived from them) were described by [3], where the authors evaluated over 10 thousand malware samples to pinpoint malicious activities.…”
Section: Risks and Inference Rulesmentioning
confidence: 99%