Title
Analysis On The Sequential Behavior Of Malware Attacks
Abstract
Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the hots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.
Year
DOI
Venue
2011
10.1587/transinf.E94.D.2139
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
Keywords
Field
DocType
PrefixSpan, malware, botnets, coordinated attack, sequential pattern
Honeypot,PrefixSpan,Cryptovirology,Attack patterns,Botnet,Computer science,Computer security,Malware,Internet traffic,The Internet
Journal
Volume
Issue
ISSN
E94D
11
1745-1361
Citations 
PageRank 
References 
2
0.44
12
Authors
5
Name
Order
Citations
PageRank
Nur Rohman Rosyid120.77
Masayuki Ohrui241.25
hiroaki kikuchi32216.34
Pitikhate Sooraksa4206.81
Masato Terada5189.65