Behavioral clustering of HTTP-based malware and signature generation using malicious network traces
Title | Behavioral clustering of HTTP-based malware and signature generation using malicious network traces |
Publication Type | Conference Papers |
Year of Publication | 2010 |
Authors | Perdisci R, Lee W, Feamster N |
Conference Name | Proceedings of the 7th USENIX conference on Networked systems design and implementation |
Date Published | 2010/// |
Publisher | USENIX Association |
Conference Location | Berkeley, CA, USA |
Abstract | We present a novel network-level behavioral malware clustering system. We focus on analyzing the structural similarities among malicious HTTP traffic traces generated by executing HTTP-based malware. Our work is motivated by the need to provide quality input to algorithms that automatically generate network signatures. Accordingly, we define similarity metrics among HTTP traces and develop our system so that the resulting clusters can yield high-quality malware signatures. We implemented a proof-of-concept version of our network-level malware clustering system and performed experiments with more than 25,000 distinct malware samples. Results from our evaluation, which includes real-world deployment, confirm the effectiveness of the proposed clustering system and show that our approach can aid the process of automatically extracting network signatures for detecting HTTP traffic generated by malware-compromised machines. |
URL | http://dl.acm.org/citation.cfm?id=1855711.1855737 |