Skip to main content

Traffic aggregation for malware detection

Publication ,  Conference
Yen, TF; Reiter, MK
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
August 27, 2008

Stealthy malware, such as botnets and spyware, are hard to detect because their activities are subtle and do not disrupt the network, in contrast to DoS attacks and aggressive worms. Stealthy malware, however, does communicate to exfiltrate data to the attacker, to receive the attacker's commands, or to carry out those commands. Moreover, since malware rarely infiltrates only a single host in a large enterprise, these communications should emerge from multiple hosts within coarse temporal proximity to one another. In this paper, we describe a system called Tāmd (pronounced "tamed") with which an enterprise can identify candidate groups of infected computers within its network. Tāmd accomplishes this by finding new communication "aggregates" involving multiple internal hosts, i.e., communication flows that share common characteristics. We describe characteristics for defining aggregates-including flows that communicate with the same external network, that share similar payload, and/or that involve internal hosts with similar software platforms-and justify their use in finding infected hosts. We also detail efficient algorithms employed by Tāmd for identifying such aggregates, and demonstrate a particular configuration of Tāmd that identifies new infections for multiple bot and spyware examples, within traces of traffic recorded at the edge of a university network. This is achieved even when the number of infected hosts comprise only about 0.0097% of all internal hosts in the network. © 2008 Springer-Verlag Berlin Heidelberg.

Duke Scholars

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

August 27, 2008

Volume

5137 LNCS

Start / End Page

207 / 227

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Yen, T. F., & Reiter, M. K. (2008). Traffic aggregation for malware detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5137 LNCS, pp. 207–227). https://doi.org/10.1007/978-3-540-70542-0_11
Yen, T. F., and M. K. Reiter. “Traffic aggregation for malware detection.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5137 LNCS:207–27, 2008. https://doi.org/10.1007/978-3-540-70542-0_11.
Yen TF, Reiter MK. Traffic aggregation for malware detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 207–27.
Yen, T. F., and M. K. Reiter. “Traffic aggregation for malware detection.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5137 LNCS, 2008, pp. 207–27. Scopus, doi:10.1007/978-3-540-70542-0_11.
Yen TF, Reiter MK. Traffic aggregation for malware detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 207–227.

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

August 27, 2008

Volume

5137 LNCS

Start / End Page

207 / 227

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences