MAGMA network behavior classifier for malware traffic

Cited 9 time in webofscience Cited 0 time in scopus
  • Hit : 657
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorBocchi, Enricoko
dc.contributor.authorGrimaudo, Luigiko
dc.contributor.authorMellia, Marcoko
dc.contributor.authorBaralis, Elenako
dc.contributor.authorSaha, Sabyasachiko
dc.contributor.authorMiskovic, Stanislavko
dc.contributor.authorModelo-Howard, Gasparko
dc.contributor.authorLee, Sung-Juko
dc.date.accessioned2017-01-12T05:20:54Z-
dc.date.available2017-01-12T05:20:54Z-
dc.date.created2016-12-23-
dc.date.created2016-12-23-
dc.date.issued2016-11-
dc.identifier.citationCOMPUTER NETWORKS, v.109, pp.142 - 156-
dc.identifier.issn1389-1286-
dc.identifier.urihttp://hdl.handle.net/10203/218226-
dc.description.abstractMalware is a major threat to security and privacy of network users. A large variety of malware is typically spread over the Internet, hiding in benign traffic. New types of malware appear every day, challenging both the research community and security companies to improve malware identification techniques. In this paper we present MAGMA, MultilAyer Graphs for MAlware detection, a novel malware behavioral classifier. Our system is based on a Big Data methodology, driven by real-world data obtained from traffic traces collected in an operational network. The methodology we propose automatically extracts patterns related to a specific input event, i.e., a seed, from the enormous amount of events the network carries. By correlating such activities over (i) time, (ii) space, and (iii) network protocols, we build a Network Connectivity Graph that captures the overall "network behavior" of the seed. We next extract features from the Connectivity Graph and design a supervised classifier. We run MAGMA on a large dataset collected from a commercial Internet Provider where 20,000 Internet users generated more than 330 million events. Only 42,000 are flagged as malicious by a commercial IDS, which we consider as an oracle. Using this dataset, we experimentally evaluate MAGMA accuracy and robustness to parameter settings. Results indicate that MAGMA reaches 95% accuracy, with limited false positives. Furthermore, MAGMA proves able to identify suspicious network events that the IDS ignored. (C) 2016 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.titleMAGMA network behavior classifier for malware traffic-
dc.typeArticle-
dc.identifier.wosid000388546500003-
dc.identifier.scopusid2-s2.0-85006186596-
dc.type.rimsART-
dc.citation.volume109-
dc.citation.beginningpage142-
dc.citation.endingpage156-
dc.citation.publicationnameCOMPUTER NETWORKS-
dc.identifier.doi10.1016/j.comnet.2016.03.021-
dc.contributor.localauthorLee, Sung-Ju-
dc.contributor.nonIdAuthorBocchi, Enrico-
dc.contributor.nonIdAuthorGrimaudo, Luigi-
dc.contributor.nonIdAuthorMellia, Marco-
dc.contributor.nonIdAuthorBaralis, Elena-
dc.contributor.nonIdAuthorSaha, Sabyasachi-
dc.contributor.nonIdAuthorMiskovic, Stanislav-
dc.contributor.nonIdAuthorModelo-Howard, Gaspar-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorNetwork traffic modeling-
dc.subject.keywordAuthorMalware characterization-
dc.subject.keywordAuthorMalicious behaviors detection-
dc.subject.keywordAuthorGraph networks-
dc.subject.keywordAuthorAutomatic classification-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 9 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0