메뉴 건너뛰기




Volumn 8145 LNCS, Issue , 2013, Pages 144-163

FIRMA: Malware clustering and network signature generation with mixed network behaviors

Author keywords

Malware Clustering; Network Signatures; Signature Generation

Indexed keywords

AUTOMATIC TOOLS; BEHAVIORAL SIGNATURES; MALWARE FAMILIES; MALWARES; NETWORK ADMINISTRATOR; NETWORK BEHAVIORS; POLYMORPHIC VARIANT; SIGNATURE GENERATION;

EID: 84888354292     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-41284-4_8     Document Type: Conference Paper
Times cited : (63)

References (42)
  • 3
    • 38149089416 scopus 로고    scopus 로고
    • Automated classification and analysis of internet malware
    • Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
    • Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178-197. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4637 , pp. 178-197
    • Bailey, M.1    Oberheide, J.2    Andersen, J.3    Mao, Z.M.4    Jahanian, F.5    Nazario, J.6
  • 6
    • 85025141365 scopus 로고    scopus 로고
    • Binary code extraction and interface identification for security applications
    • Caballero, J., Johnson, N.M., McCamant, S., Song, D.: Binary code extraction and interface identification for security applications. In: NDSS (2010)
    • NDSS (2010)
    • Caballero, J.1    Johnson, N.M.2    McCamant, S.3    Song, D.4
  • 7
    • 77952403312 scopus 로고    scopus 로고
    • Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
    • Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: CCS (2007)
    • CCS (2007)
    • Caballero, J.1    Yin, H.2    Liang, Z.3    Song, D.4
  • 8
    • 0000301097 scopus 로고
    • A greedy heuristic for the set-covering problem
    • Chvatal, V.: A greedy heuristic for the set-covering problem. Mathematics of Operations Research 4(3) (1979)
    • (1979) Mathematics of Operations Research , vol.4 , Issue.3
    • Chvatal, V.1
  • 12
    • 84869388520 scopus 로고    scopus 로고
    • Manufacturing compromise: The emergence of exploit-as-a-service
    • Grier, C., et al.:Manufacturing compromise: The emergence of exploit-as-a-service. In: CCS (2012)
    • CCS (2012)
    • Grier, C.1
  • 13
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol and structure independent botnet detection
    • Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol and structure independent botnet detection. In: Usenixsecurity (2008)
    • Usenixsecurity (2008)
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 14
    • 56549090955 scopus 로고    scopus 로고
    • A study of the packer problem and its solutions
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Guo, F., Ferrie, P., Chiueh, T.-C.: A study of the packer problem and its solutions. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 98-115. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 98-115
    • Guo, F.1    Ferrie, P.2    Chiueh, T.-C.3
  • 16
    • 80755168347 scopus 로고    scopus 로고
    • Bitshred: Feature hashing malware for scalable triage and semantic analysis
    • Jang, J., Brumley, D., Venkataraman, S.: Bitshred: Feature hashing malware for scalable triage and semantic analysis. In: CCS (2011)
    • CCS (2011)
    • Jang, J.1    Brumley, D.2    Venkataraman, S.3
  • 18
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Kim, H.-A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Usenixsecurity (2004)
    • Usenixsecurity (2004)
    • Kim, H.-A.1    Karp, B.2
  • 20
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - creating intrusion detection signatures using honeypots
    • Kreibich, C., Crowcroft, J.: Honeycomb - creating intrusion detection signatures using honeypots. In: Hotnets (2003)
    • Hotnets (2003)
    • Kreibich, C.1    Crowcroft, J.2
  • 23
    • 84888352929 scopus 로고    scopus 로고
    • The malicia project, http://malicia-project.com/.
  • 24
    • 84881183138 scopus 로고    scopus 로고
    • Driving in the cloud: An analysis of drive-by download operations and abuse reporting
    • Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. Springer, Heidelberg
    • Nappa, A., Rafique, M.Z., Caballero, J.: Driving in the cloud: An analysis of drive-by download operations and abuse reporting. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 1-20. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7967 , pp. 1-20
    • Nappa, A.1    Rafique, M.Z.2    Caballero, J.3
  • 26
    • 85076751448 scopus 로고    scopus 로고
    • Behavioral clustering of http-based malware and signature generation using malicious network traces
    • Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: NSDI (2010)
    • NSDI (2010)
    • Perdisci, R.1    Lee, W.2    Feamster, N.3
  • 27
    • 84904093630 scopus 로고    scopus 로고
    • Towards a fully automated malware clustering validity analysis
    • Perdisci, R., Vamo, M.U.: Towards a fully automated malware clustering validity analysis. In: ACSAC (2012)
    • ACSAC (2012)
    • Perdisci, R.1    Vamo, M.U.2
  • 28
    • 49949090311 scopus 로고    scopus 로고
    • Learning and classification of malware behavior
    • Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
    • Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108-125. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 108-125
    • Rieck, K.1    Holz, T.2    Willems, C.3    Düssel, P.4    Laskov, P.5
  • 30
    • 84881159206 scopus 로고    scopus 로고
    • PRO VEX: Detecting botnets with encrypted command and control channels
    • Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. Springer, Heidelberg
    • Rossow, C., Dietrich, C.J.: PRO VEX: Detecting botnets with encrypted command and control channels. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 21-40. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7967 , pp. 21-40
    • Rossow, C.1    Dietrich, C.J.2
  • 33
    • 84888369468 scopus 로고    scopus 로고
    • Snort, http://www.snort.org/.
  • 34
    • 84888355887 scopus 로고    scopus 로고
    • Suricata, http://suricata-ids.org/.
  • 35
    • 8344251916 scopus 로고    scopus 로고
    • Deterministic memory-efficient string matching algorithms for intrusion detection
    • Tuck, N., Sherwood, T., Calder, B., Varghese, G.: Deterministic memory-efficient string matching algorithms for intrusion detection. In: Infocom (2004)
    • Infocom (2004)
    • Tuck, N.1    Sherwood, T.2    Calder, B.3    Varghese, G.4
  • 37
    • 33745641552 scopus 로고    scopus 로고
    • Anomalous payload-based worm detection and signature generation
    • Valdes, A., Zamboni, D. (eds.) RAID 2005. Springer, Heidelberg
    • Wang, K., Cretu, G.F., Stolfo, S.J.: Anomalous payload-based worm detection and signature generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 227-246. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3858 , pp. 227-246
    • Wang, K.1    Cretu, G.F.2    Stolfo, S.J.3
  • 38
    • 70350374367 scopus 로고    scopus 로고
    • Automatically generating models for botnet detection
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Wurzinger, P., Bilge, L., Holz, T., Goebel, J., Kruegel, C., Kirda, E.: Automatically generating models for botnet detection. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 232-249. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 232-249
    • Wurzinger, P.1    Bilge, L.2    Holz, T.3    Goebel, J.4    Kruegel, C.5    Kirda, E.6
  • 39
    • 84881159288 scopus 로고    scopus 로고
    • Wyke, J.: The zeroaccess botnet (2012), http://www.sophos.com/en-us/why- sophos/our-people/technical-papers/zeroaccess-botnet.aspx
    • (2012) The Zeroaccess Botnet
    • Wyke, J.1
  • 42
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for malware detection and analysis
    • Yin, H., Song, D., Manuel, E., Kruegel, C., Kirda, E.: Panorama: Capturing system-wide information flow for malware detection and analysis. In: CCS (2007)
    • CCS (2007)
    • Yin, H.1    Song, D.2    Manuel, E.3    Kruegel, C.4    Kirda, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.