An empirical study of malware evolution

COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks(2009)

引用 48|浏览74
暂无评分
摘要
The diversity, sophistication and availability of malicious software (malcode/malware) pose enormous challenges for securing networks and end hosts from attacks. In this paper, we analyze a large corpus of malcode meta data compiled over a period of 19 years. Our aim is to understand how malcode has evolved over the years, and in particular, how different instances of malcode relate to one another. We develop a novel graph pruning technique to establish the inheritance relationships between different instances of malcode based on temporal information and key common phrases Identified In the malcode descriptions. Our algorithm enables a range of possible inheritance structures. We study the resulting "likely" malcode families, which we identify through extensive manual investigation. We present an evaluation of gross characteristics of malcode evolution and also drill down on the details of the most interesting and potentially dangerous malcode families.
更多
查看译文
关键词
possible inheritance structure,malcode family,malcode meta data,malcode evolution,dangerous malcode family,enormous challenge,malware evolution,empirical study,end host,inheritance relationship,malcode description,different instance,network security,classification algorithms,graph theory,probability density function,malicious software,data mining,text mining,entropy,databases
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要