메뉴 건너뛰기




Volumn 12, Issue 2, 2016, Pages 69-100

Network malware classification comparison using DPI and flow packet headers

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; COMPUTER CRIME; PACKET NETWORKS;

EID: 84964282510     PISSN: 22742042     EISSN: 22638733     Source Type: Journal    
DOI: 10.1007/s11416-015-0247-x     Document Type: Article
Times cited : (55)

References (111)
  • 2
    • 0003104018 scopus 로고    scopus 로고
    • On the merits of building categorization systems by supervised clustering
    • ACM, New York, NY
    • Aggarwal, C.C., Gates, S.C., Yu, P.S.: On the merits of building categorization systems by supervised clustering. In: KDD, KDD’99, pp. 352–356. ACM, New York, NY (1999)
    • (1999) KDD, KDD’99 , pp. 352-356
    • Aggarwal, C.C.1    Gates, S.C.2    Yu, P.S.3
  • 15
    • 2942723846 scopus 로고    scopus 로고
    • A divisive information theoretic feature clustering algorithm for text classification
    • Dhillon, I.S., Mallela, S., Kumar, R.: A divisive information theoretic feature clustering algorithm for text classification. J. Mach. Learn. Res. 3, 1265–1287 (2003)
    • (2003) J. Mach. Learn. Res. , vol.3 , pp. 1265-1287
    • Dhillon, I.S.1    Mallela, S.2    Kumar, R.3
  • 16
    • 84875230538 scopus 로고    scopus 로고
    • CoCoSpot: clustering and recognizing botnet command and control channels using traffic analysis
    • Dietrich, C.J., Rossow, C., Pohlmann, N.: CoCoSpot: clustering and recognizing botnet command and control channels using traffic analysis. Comput. Netw. 57(2), 475–486 (2013)
    • (2013) Comput. Netw. , vol.57 , Issue.2 , pp. 475-486
    • Dietrich, C.J.1    Rossow, C.2    Pohlmann, N.3
  • 19
    • 84964218087 scopus 로고    scopus 로고
    • Frank, E.: J48. [online] (2012)
    • Frank, E.: J48. [online] (2012). http://weka.sourceforge.net/doc.dev/weka/classifiers/trees/J48.html
  • 20
    • 84964218088 scopus 로고    scopus 로고
    • Class SMO
    • Frank, E., Legg, S., Inglis, S.: Class SMO. [online] (2012). http://weka.sourceforge.net/doc/weka/classifiers/functions/SMO.html
    • (2012) [online]
    • Frank, E.1    Legg, S.2    Inglis, S.3
  • 21
    • 58149321460 scopus 로고
    • Boosting a weak learning algorithm by majority
    • Freund, Y.: Boosting a weak learning algorithm by majority. Inf. Comput. 121(2), 256–285 (1995)
    • (1995) Inf. Comput. , vol.121 , Issue.2 , pp. 256-285
    • Freund, Y.1
  • 22
    • 74049104498 scopus 로고    scopus 로고
    • Neural network and artificial immune systems for malware and network intrusion detection
    • Springer, Berlin
    • Golovko, V., Bezobrazov, S., Kachurka, P., Vaitsekhovich, L.: Neural network and artificial immune systems for malware and network intrusion detection. In: Advances in Machine Learning II, pp. 485–513. Springer, Berlin (2010)
    • (2010) Advances in Machine Learning II , pp. 485-513
    • Golovko, V.1    Bezobrazov, S.2    Kachurka, P.3    Vaitsekhovich, L.4
  • 23
    • 85061529860 scopus 로고    scopus 로고
    • BotHunter: detecting malware infection through IDS-driven dialog correlation
    • USENIX Association, Berkeley, CA
    • Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: detecting malware infection through IDS-driven dialog correlation. In: Proceedings of 16th USENIX Security Symposium, SS, pp. 1–16. USENIX Association, Berkeley, CA (2007)
    • (2007) Proceedings of 16th USENIX Security Symposium, SS , pp. 1-16
    • Gu, G.1    Porras, P.2    Yegneswaran, V.3    Fong, M.4    Lee, W.5
  • 25
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • USENIX Association, Berkeley, CA
    • Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th Security Symposium, SS, pp. 139–154. USENIX Association, Berkeley, CA (2008)
    • (2008) Proceedings of the 17th Security Symposium, SS , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 27
  • 32
    • 84964207459 scopus 로고    scopus 로고
    • Karypis Lab: Data clustering software. [online] (2006–2014)
    • Karypis Lab: Data clustering software. [online] (2006–2014). http://glaros.dtc.umn.edu/gkhome/views/cluto
  • 35
    • 84893337595 scopus 로고    scopus 로고
    • SigMal: a static signal processing based malware triage
    • ACM, New York, NY
    • Kirat, D., Nataraj, L., Vigna, G., Manjunath, B.S.: SigMal: a static signal processing based malware triage. In: ACSAC’13. ACM, New York, NY (2013). doi:10.1145/2523649.2523682
    • (2013) ACSAC’13
    • Kirat, D.1    Nataraj, L.2    Vigna, G.3    Manjunath, B.S.4
  • 38
    • 20344380853 scopus 로고    scopus 로고
    • Z-ranking: Using statistical analysis to counter the impact of static analysis approximations
    • Kremenek, T., Engler, D.: Z-ranking: Using statistical analysis to counter the impact of static analysis approximations. In: SAS 2003 (2003)
    • (2003) SAS , pp. 2003
    • Kremenek, T.1    Engler, D.2
  • 39
    • 20344404753 scopus 로고    scopus 로고
    • Kremenek, T., Ashcraft, K., Yang, J., Engler, D.: Correlation exploitation in error ranking. In: Foundations of Software Engineering (FSE) (2004)
    • Kremenek, T., Ashcraft, K., Yang, J., Engler, D.: Correlation exploitation in error ranking. In: Foundations of Software Engineering (FSE) (2004)
  • 41
    • 0002862737 scopus 로고    scopus 로고
    • Fast and effective text mining using linear-time document clustering
    • ACM, New York, NY
    • Larsen, B., Aone, C.: Fast and effective text mining using linear-time document clustering. In: KDD, KDD’99, pp. 16–22. ACM, New York, NY (1999)
    • (1999) KDD, KDD’99 , pp. 16-22
    • Larsen, B.1    Aone, C.2
  • 42
    • 26844574201 scopus 로고    scopus 로고
    • Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility
    • Lee, W.: Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility. ACM SIGKDD Explorations Newsletter 4(2), 35–42 (2001)
    • (2001) ACM SIGKDD Explorations Newsletter , vol.4 , Issue.2 , pp. 35-42
    • Lee, W.1
  • 43
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive intrusion detection: a data mining approach
    • Lee, W., Stolfo, S.J., Mok, K.W.: Adaptive intrusion detection: a data mining approach. Artificial Intelligence Review 14, 533–567 (2000). doi:10.1023/1006624031083
    • (2000) Artificial Intelligence Review , vol.14 , pp. 533-567
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 45
    • 61749100211 scopus 로고    scopus 로고
    • Efficient application identification and the temporal and spatial stability of classification schema
    • Li, W., Canini, M., Moore, A.W., Bolla, R.: Efficient application identification and the temporal and spatial stability of classification schema. Comput. Netw. 53, 790–809 (2009)
    • (2009) Comput. Netw. , vol.53 , pp. 790-809
    • Li, W.1    Canini, M.2    Moore, A.W.3    Bolla, R.4
  • 47
    • 46149123241 scopus 로고    scopus 로고
    • Using machine learning techniques to identify botnet traffic
    • IEEE Computer Society, Washington, DC
    • Livadas, C., Walsh, R., Lapsley, D.E., Strayer, W.T.: Using machine learning techniques to identify botnet traffic. In: LCN, pp. 967–974. IEEE Computer Society, Washington, DC (2006)
    • (2006) LCN , pp. 967-974
    • Livadas, C.1    Walsh, R.2    Lapsley, D.E.3    Strayer, W.T.4
  • 48
    • 31844451490 scopus 로고    scopus 로고
    • Collaborative distributed intrusion detection. Tech. Rep
    • Locasto, M.E., Parekh, J.J., Stolfo, S., Misra, V.: Collaborative distributed intrusion detection. Tech. Rep. CUCS-012-04 (2004). http://hdl.handle.net/10022/AC:P:29215
    • (2004) CUCS-012-04
    • Locasto, M.E.1    Parekh, J.J.2    Stolfo, S.3    Misra, V.4
  • 51
    • 84964218514 scopus 로고    scopus 로고
    • MathWorks: MATLAB. [online] (2000–2012)
    • MathWorks: MATLAB. [online] (2000–2012). http://www.mathworks.com/products/matlab/
  • 52
    • 84964218174 scopus 로고    scopus 로고
    • MathWorks: MATLAB Coder. [online] (2012). , last viewed June 2012
    • MathWorks: MATLAB Coder. [online] (2012). http://www.mathworks.com/help/toolbox/coder/coder_product_page.html, last viewed June 2012
  • 53
    • 84964218167 scopus 로고    scopus 로고
    • MathWorks: MATLAB Coder: codegen—generate C/C++ code from MATLAB code. [online] (2012). , last viewed June 2012
    • MathWorks: MATLAB Coder: codegen—generate C/C++ code from MATLAB code. [online] (2012). http://www.mathworks.com/help/toolbox/coder/ref/codegen.html, last viewed June 2012
  • 55
    • 57049169279 scopus 로고    scopus 로고
    • Study of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF
    • Desai BC, (ed), ACM, Montreal, Quebec
    • Mokhov, S.A.: Study of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF. In: Desai, B.C. (ed.) Proceedings of C3S2E’08, pp. 29–43. ACM, Montreal, Quebec (2008). doi:10.1145/1370256.1370262
    • (2008) Proceedings of C3S2E’08 , pp. 29-43
    • Mokhov, S.A.1
  • 56
    • 84964260414 scopus 로고    scopus 로고
    • Mokhov, S.A.: MARFCAT—MARF-based Code Analysis Tool. Published electronically within the MARF project. (2010–2015). Last viewed February 2014
    • Mokhov, S.A.: MARFCAT—MARF-based Code Analysis Tool. Published electronically within the MARF project. http://sourceforge.net/projects/marf/files/Applications/MARFCAT/ (2010–2015). Last viewed February 2014
  • 57
    • 84964260416 scopus 로고    scopus 로고
    • Mokhov, S.A.: The use of machine learning with signal- and NLP processing of source code to fingerprint, detect, and classify vulnerabilities and weaknesses with MARFCAT. Tech. Rep. NIST SP 500–283, NIST (2011). Report: , online e-print at
    • Mokhov, S.A.: The use of machine learning with signal- and NLP processing of source code to fingerprint, detect, and classify vulnerabilities and weaknesses with MARFCAT. Tech. Rep. NIST SP 500–283, NIST (2011). Report: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909407, online e-print at http://arxiv.org/abs/1010.2511
  • 58
    • 84964227319 scopus 로고    scopus 로고
    • Intensional cyberforensics. Ph.D. thesis, Department of Computer Science and Software Engineering, Concordia University
    • Mokhov, S.A.: Intensional cyberforensics. Ph.D. thesis, Department of Computer Science and Software Engineering, Concordia University, Montreal (2013). arXiv:1312.0466
    • Montreal (2013). arXiv , pp. 0466
    • Mokhov, S.A.1
  • 61
    • 78249288445 scopus 로고    scopus 로고
    • Mokhov, S.A., Paquet, J., Debbabi, M.: Towards automatic deduction and event reconstruction using Forensic Lucid and probabilities to encode the IDS evidence. In: S. Jha, R. Sommer, C. Kreibich (eds.) Proceedings of Recent Advances in Intrusion Detection RAID’10, Lecture Notes in Computer Science (LNCS), vol. 6307, pp. 508–509. Springer, Berlin (2010)
    • Mokhov, S.A., Paquet, J., Debbabi, M.: Towards automatic deduction and event reconstruction using Forensic Lucid and probabilities to encode the IDS evidence. In: S. Jha, R. Sommer, C. Kreibich (eds.) Proceedings of Recent Advances in Intrusion Detection RAID’10, Lecture Notes in Computer Science (LNCS), vol. 6307, pp. 508–509. Springer, Berlin (2010). doi:10.1007/978-3-642-15512-3_36
  • 62
    • 84901684445 scopus 로고    scopus 로고
    • Mokhov, S.A., Paquet, J., Debbabi, M.: The use of NLP techniques in static code analysis to detect weaknesses and vulnerabilities. In: M. Sokolova, P. van Beek (eds.) Proceedings of Canadian Conference on AI’14, LNAI, vol. 8436, pp. 326–332. Springer, Berlin (2014). doi:. Short paper
    • Mokhov, S.A., Paquet, J., Debbabi, M.: The use of NLP techniques in static code analysis to detect weaknesses and vulnerabilities. In: M. Sokolova, P. van Beek (eds.) Proceedings of Canadian Conference on AI’14, LNAI, vol. 8436, pp. 326–332. Springer, Berlin (2014). doi:10.1007/978-3-319-06483-3_33. Short paper
  • 63
    • 85119160487 scopus 로고    scopus 로고
    • Mokhov, S.A., Paquet, J., Debbabi, M.: MARFCAT: Fast code analysis for defects and vulnerabilities. In: Proceedings of SWAN’15, pp. 35–38. IEEE (2015) (to appear)
    • Mokhov, S.A., Paquet, J., Debbabi, M.: MARFCAT: Fast code analysis for defects and vulnerabilities. In: Proceedings of SWAN’15, pp. 35–38. IEEE (2015) (to appear)
  • 64
    • 84964230479 scopus 로고    scopus 로고
    • Efficient polyphase FIR resampler for numpy: Native C/C++ implementation of the function upfirdn()
    • Motorola: Efficient polyphase FIR resampler for numpy: Native C/C++ implementation of the function upfirdn(). [online] (2009). http://code.google.com/p/upfirdn/source/browse/upfirdn
    • (2009) [online]
  • 65
    • 84964230475 scopus 로고    scopus 로고
    • Murphy, K.P.: HMM toolbox. [online] (2002–2014)
    • Murphy, K.P.: HMM toolbox. [online] (2002–2014). http://www.cs.ubc.ca/murphyk/Software/HMM/hmm_download.html
  • 72
    • 0033295259 scopus 로고    scopus 로고
    • Bro: a system for detecting network intruders in real-time
    • Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23–24), 2435–2463 (1999). http://www.icir.org/vern/papers/bro-CN99.pdf
    • (1999) Comput. Netw , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 74
    • 61749083929 scopus 로고    scopus 로고
    • McPAD: a multiple classifier system for accurate payload-based anomaly detection
    • Perdisci, R., Ariu, D., Fogla, P., Giacinto, G., Lee, W.: McPAD: a multiple classifier system for accurate payload-based anomaly detection. Comput. Netw. 53(6), 864–881 (2009)
    • (2009) Comput. Netw. , vol.53 , Issue.6 , pp. 864-881
    • Perdisci, R.1    Ariu, D.2    Fogla, P.3    Giacinto, G.4    Lee, W.5
  • 78
    • 35248844193 scopus 로고    scopus 로고
    • Comparative study of the baum-welch and viterbi training algorithms applied to read and spontaneous speech recognition
    • Springer, Berlin
    • Rodríguez, L.J., Torres, I.: Comparative study of the baum-welch and viterbi training algorithms applied to read and spontaneous speech recognition. In: Pattern Recognition and Image Analysis. Lecture Notes in Computer Science, vol. 2652, pp. 847–857. Springer, Berlin (2003)
    • (2003) Pattern Recognition and Image Analysis. Lecture Notes in Computer Science, vol. 2652 , pp. 847-857
    • Rodríguez, L.J.1    Torres, I.2
  • 81
    • 84964218501 scopus 로고    scopus 로고
    • Schreiber, R.: MATLAB. Scholarpedia 2(6), 2929 (2007). doi:
    • Schreiber, R.: MATLAB. Scholarpedia 2(6), 2929 (2007). doi:10.4249/scholarpedia.2929. http://www.scholarpedia.org/article/MATLAB
  • 84
    • 33745474966 scopus 로고    scopus 로고
    • Scan detection: a data mining approach
    • SIAM, Philadelphia, PA
    • Simon, G.J., Xiong, H., Eilertson, E., Kumar, V.: Scan detection: a data mining approach. In: Proceedings of SDM 2006, pp. 118–129. SIAM, Philadelphia, PA (2006). http://www.siam.org/meetings/sdm06/proceedings/011simong.pdf
    • (2006) Proceedings of SDM 2006 , pp. 118-129
    • Simon, G.J.1    Xiong, H.2    Eilertson, E.3    Kumar, V.4
  • 85
    • 84964204706 scopus 로고    scopus 로고
    • Sly Technologies Inc: jNetPcap OpenSource. [online] (2012)
    • Sly Technologies Inc: jNetPcap OpenSource. [online] (2012). http://www.jnetpcap.com/
  • 86
    • 84964281685 scopus 로고    scopus 로고
    • BitBlaze: Security via binary analysis
    • Song, D.: BitBlaze: Security via binary analysis. [online] (2010). http://bitblaze.cs.berkeley.edu
    • (2010) [online]
    • Song, D.1
  • 87
    • 84964231077 scopus 로고    scopus 로고
    • WebBlaze: New techniques and tools for web security
    • Song, D.: WebBlaze: New techniques and tools for web security. [online] (2010). http://webblaze.cs.berkeley.edu
    • (2010) [online]
    • Song, D.1
  • 89
    • 84964204715 scopus 로고    scopus 로고
    • Sourcefire: Snort: open-source network intrusion prevention and detection system (IDS/IPS). [online] (1999–2015)
    • Sourcefire: Snort: open-source network intrusion prevention and detection system (IDS/IPS). [online] (1999–2015). http://www.snort.org/
  • 90
    • 85012240666 scopus 로고    scopus 로고
    • Data mining-based intrusion detectors: an overview of the Columbia IDS Project
    • Stolfo, S.J., Lee, W., Chan, P.K., Fan, W., Eskin, E.: Data mining-based intrusion detectors: an overview of the Columbia IDS Project. ACM SIGMOD Record 30(4), 5–14 (2001)
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4 , pp. 5-14
    • Stolfo, S.J.1    Lee, W.2    Chan, P.K.3    Fan, W.4    Eskin, E.5
  • 93
    • 84964215037 scopus 로고    scopus 로고
    • The Weka Project: Weka 3: data mining with open source machine learning software in Java. [online] (2006–2014)
    • The Weka Project: Weka 3: data mining with open source machine learning software in Java. [online] (2006–2014). http://www.cs.waikato.ac.nz/ml/weka/
  • 95
    • 84964205716 scopus 로고    scopus 로고
    • ThreadAnalyzer: dynamic sandboxing and malware analysis (formerly GFI SandBox)
    • ThreatTrack Security: ThreadAnalyzer: dynamic sandboxing and malware analysis (formerly GFI SandBox). [online] (2013). http://www.threattracksecurity.com/enterprise-security/sandbox-software.aspx
    • (2013) [online]
  • 96
    • 84964216885 scopus 로고    scopus 로고
    • K.: A malware instruction set for behavior-based analysis
    • Trinius, P., Willems, C., Holz, T., Rieck, K.: A malware instruction set for behavior-based analysis (2011)
    • (2011) Rieck
    • Trinius, P.1    Willems, C.2    Holz, T.3
  • 98
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Springer, Berlin
    • Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Recent Advances in Intrusion Detection, pp. 203–222. Springer, Berlin (2004)
    • (2004) Recent Advances in Intrusion Detection , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 101
    • 84964205732 scopus 로고    scopus 로고
    • Wireless and Secure Networks Research Lab: WISNET: downloads. [online] (2009–2014)
    • Wireless and Secure Networks Research Lab: WISNET: downloads. [online] (2009–2014). http://wisnet.seecs.nust.edu.pk/downloads.php
  • 104
    • 33745165284 scopus 로고    scopus 로고
    • Analyzing TCP traffic patterns using self organizing maps
    • Springer, Berlin
    • Zanero, S.: Analyzing TCP traffic patterns using self organizing maps. In: Image Analysis and Processing (ICIAP 2005), pp. 83–90. Springer, Berlin (2005)
    • (2005) Image Analysis and Processing (ICIAP 2005) , pp. 83-90
    • Zanero, S.1
  • 107
    • 84964204728 scopus 로고    scopus 로고
    • The Massive Spy Malware Infiltrating Iranian Computers, WIRED
    • Zetter, K.: Meet ‘Flame’, The Massive Spy Malware Infiltrating Iranian Computers. WIRED (2012). http://www.wired.com/threatlevel/2012/05/flame/
    • (2012) Meet ‘Flame’
    • Zetter, K.1
  • 108
    • 84888643750 scopus 로고    scopus 로고
    • A distributed framework for demand-driven software vulnerability detection
    • Zhang, D., Liu, D., Csallner, C., Kung, D., Lei, Y.: A distributed framework for demand-driven software vulnerability detection. J. Syst. Softw. 87, 60–73 (2014). doi:10.1016/j.jss.2013.08.033
    • (2014) J. Syst. Softw. , vol.87 , pp. 60-73
    • Zhang, D.1    Liu, D.2    Csallner, C.3    Kung, D.4    Lei, Y.5
  • 110
    • 24044537630 scopus 로고    scopus 로고
    • Hierarchical clustering algorithms for document datasets
    • Zhao, Y., Karypis, G., Fayyad, U.: Hierarchical clustering algorithms for document datasets. Data Min. Knowl. Discov. 10(2), 141–168 (2005)
    • (2005) Data Min. Knowl. Discov. , vol.10 , Issue.2 , pp. 141-168
    • Zhao, Y.1    Karypis, G.2    Fayyad, U.3
  • 111
    • 24944501423 scopus 로고    scopus 로고
    • Generative model-based document clustering: a comparative study
    • Zhong, S., Ghosh, J.: Generative model-based document clustering: a comparative study. Knowl. Inf. Syst. 8(3), 374–384 (2005)
    • (2005) Knowl. Inf. Syst. , vol.8 , Issue.3 , pp. 374-384
    • Zhong, S.1    Ghosh, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.