Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security 2016
DOI: 10.1145/2897845.2897918
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining

Abstract: In this paper we propose Mastino, a novel defense system to detect malware download events. A download event is a 3-tuple that identifies the action of downloading a file from a URL that was triggered by a client (machine). Mastino utilizes global situation awareness and continuously monitors various network-and system-level events of the clients' machines across the Internet and provides real time classification of both files and URLs to the clients upon submission of a new, unknown file or URL to the system.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…The core idea of graphbased malware detection is modeling the interactions among malware, endpoints and network servers as graphs, and leverage various machine learning models to understand the patterns and detect previous unknown malicious files or activities. For example, CAMP [60], Mastino [59], and Polonium [48] built graphs from binary activity data and detect malware. Similarly, Marmite [69], NAZCA [32], AESOP [72] and Kwon et al [38] built graphs from binary download/distribution data and detect previous unknown malware.…”
Section: Related Workmentioning
confidence: 99%
“…The core idea of graphbased malware detection is modeling the interactions among malware, endpoints and network servers as graphs, and leverage various machine learning models to understand the patterns and detect previous unknown malicious files or activities. For example, CAMP [60], Mastino [59], and Polonium [48] built graphs from binary activity data and detect malware. Similarly, Marmite [69], NAZCA [32], AESOP [72] and Kwon et al [38] built graphs from binary download/distribution data and detect previous unknown malware.…”
Section: Related Workmentioning
confidence: 99%
“…5 shows the basic idea of the procedure described above, which underscores the file co-occurring as well as the hostfile relationship. We use (14) to update the labels of each data object until convergence. Convergence means that the predicted labels of the data will not change in several successive iterations.…”
Section: B Homophilic Host-file Relationship Based On File Co-occurrencementioning
confidence: 99%
“…We will do so by transforming (1 − α) I − α d W −1 into a standard symmetrical matrix. Rewrite (14) as…”
Section: B Homophilic Host-file Relationship Based On File Co-occurrencementioning
confidence: 99%
“…Zhang and Shen [22] employ a statistical learning based approach to reduce false positives on IDSs. Rahbarinia et al [23] use graph mining techniques for analyzing download events for detecting malware download. These works are concentrated on improving an IDS, and present interesting discussions that could complement SADF in a possible future work integrating IDS into its architecture.…”
Section: Related Workmentioning
confidence: 99%