Publications

Polymorphic malware behavior through network trace analysis

Abstract

Malware continues to be a major threat to information security. To avoid being detected and analyzed, modern malware is continuously improving its stealthiness, including code obfuscation and encryption. On the other hand, a high number of unique malware samples detected daily suggests a likely high degree of code reuse under the layers of stealth. We observe that although obfuscation greatly changes a malware's binary, its functionalities remain intact. We propose to leverage malware's network behavior during its execution, to understand the malware's functionality and detect related or even same (polymorphic) malware. While malware may transform its code to evade analysis, we contend that its key network behaviors must endure through the transformations to achieve the malware's ultimate purpose, such as sending victim information, scanning for vulnerable hosts, etc. We propose an encoding of …

Metadata

publication
2022 14th International Conference on COMmunication Systems & NETworkS …, 2022
year
2022
publication date
2022/1/4
authors
Xiyue Deng, Jelena Mirkovic
link
https://ieeexplore.ieee.org/abstract/document/9668396/
resource_link
https://www.isi.edu/people-mirkovic/wp-content/uploads/sites/52/2023/10/a25-dengfinal.pdf
conference
2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS)
pages
138-146
publisher
IEEE