• DocumentCode
    3777553
  • Title

    Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation

  • Author

    Naoto Nakagawa;Yoshimi Teshigawara;Ryoichi Sasaki

  • Author_Institution
    Tokyo Denki Univ., Tokyo, Japan
  • fYear
    2015
  • Firstpage
    46
  • Lastpage
    51
  • Abstract
    Advanced Persistent Threat (APT) attacks, which have become prevalent in recent years, are classified into four phases. These are initial compromise phase, attacking infrastructure building phase, penetration and exploration phase, and mission execution phase. The malware on infected terminals attempts various communications on and after the attacking infrastructure building phase. In this research, using OpenFlow technology for virtual networks, we developed a system of identifying infected terminals by detecting communication events of malware communications in APT attacks. In addition, we prevent information fraud by using OpenFlow, which works as real-time path control. To evaluate our system, we executed malware infection experiments with a simulation tool for APT attacks and malware samples. In these experiments, an existing network using only entry control measures was prepared. As a result, we confirm the developed system is effective.
  • Keywords
    "Malware","Ports (Computers)","Databases","Protocols","IP networks","Computer security","Digital forensics"
  • Publisher
    ieee
  • Conference_Titel
    Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015 Fourth International Conference on
  • Type

    conf

  • DOI
    10.1109/CyberSec.2015.18
  • Filename
    7491560