Network Malware Capture

Christopher Jordan, Alice Chang, Kun Luo

Washington, DC(2009)

引用 1|浏览0
暂无评分
摘要
Botnets are a fundamental threat to network security. Their lifecycle follows a repeated pattern of growth via exploitation, infection and communication(command & control). Preventing botnet command & control requires runtime knowledge of communication attributes on a per bot basis. One approach to this is to evaluate the malware binary, but this approach is often significantly hampered by software obfuscation techniques designed to thwart binary analysis. Our research is focused on the collection and analysis of botnet growth patterns as they appear at the network level. This has the tangible result of capturing malware in a pristine state (though often packed). By intercepting the malware while it is transferred during infection prior to it reaching the target host, the captured malware cannot benefit from the complexity of obfuscation and dispersion, which occurs during installation on a target system.
更多
查看译文
关键词
communication attribute,network malware capture,binary analysis,network level,target host,botnet command,botnet growth pattern,target system,network security,malware binary,software obfuscation technique,probability density function,internet,national security,software design,botnet,botnets,systems analysis,terrorism,computer security,protocols,data mining,payloads,operating systems,pattern analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要