• DocumentCode
    654977
  • Title

    A Scalable Implementation of Malware Detection Based on Network Connection Behaviors

  • Author

    Liang Shi ; Jialan Que ; Zhenyu Zhong ; Meyer, Bertrand ; Crenshaw, Patrick ; Yuanchen He

  • Author_Institution
    Data Min. Res., McAfee Labs., Alpharetta, GA, USA
  • fYear
    2013
  • fDate
    10-12 Oct. 2013
  • Firstpage
    59
  • Lastpage
    66
  • Abstract
    When hundreds of thousands of applications need to be analyzed within a short period of time, existing static and dynamic malware detection methods may become less desirable because they could quickly exhaust system and human resources. Additionally, many behavioral malware detection methods may not be practical because they require the collection of applications´ system-level and network-level activities, which may not always be available. In this paper, we propose a malware behavioral clustering approach to detect malware variants based on applications´ simple network connection data, which can be easily collected from anti-virus (AV) products. This approach is highly scalable and has been used on huge volumes of real-world data. Our experiments demonstrate that, at a false positive rate lower than 0.001%, the proposed method achieved a detection rate of 80%+ in identifying spambots and achieved a 50%+ detection rate on average when detecting 3 popular malware families. In addition, the proposed method was deployed in a real environment and it detected malware instances more than one week earlier on average than two other leading AV products.
  • Keywords
    invasive software; pattern clustering; anti-virus products; behavioral malware detection methods; dynamic malware detection methods; network connection behaviors; network-level activities; static malware detection methods; system-level activities; Data mining; Electronic mail; Feature extraction; Malware; Ports (Computers); Protocols; Vectors; Clustering; False Positive; Malware; Scalable;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2013 International Conference on
  • Conference_Location
    Beijing
  • Type

    conf

  • DOI
    10.1109/CyberC.2013.19
  • Filename
    6685660