• DocumentCode
    130329
  • Title

    Identification of malware activities with rules

  • Author

    Jasiul, Bartosz ; Sliwa, Joanna ; Gleba, Kamil ; Szpyrka, Marcin

  • Author_Institution
    C4I Syst.´ Dept., Mil. Commun. Inst., Zegrze, Poland
  • fYear
    2014
  • fDate
    7-10 Sept. 2014
  • Firstpage
    101
  • Lastpage
    110
  • Abstract
    The article describes the method of malware activities identification using ontology and rules. The method supports detection of malware at host level by observing its behavior. It sifts through hundred thousands of regular events and allows to identify suspicious ones. They are then passed on to the second building block responsible for malware tracking and matching stored models with observed malicious actions. The presented method was implemented and verified in the infected computer environment. As opposed to signature-based antivirus mechanisms it allows to detect malware the code of which has been obfuscated.
  • Keywords
    data mining; invasive software; infected computer environment; malware activities identification; malware detection; malware tracking; ontology; signature-based antivirus mechanisms; Computers; Engines; Knowledge based systems; Malware; Monitoring; Ontologies;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on
  • Conference_Location
    Warsaw
  • Type

    conf

  • DOI
    10.15439/2014F265
  • Filename
    6933002