Ismail, Ismahani and Marsono, Muhammad Nadzir and Khammas, Ban Mohammed and Mohd. Nor, Sulaiman (2015) Incorporating known malware signatures to classify new malware variants in network traffic. International Journal of Network Management, 25 (6). pp. 471-489. ISSN 1055-7148
Full text not available from this repository.
Official URL: http://dx.doi.org/10.1002/nem.1913
Abstract
Content-based malware classification technique using n-gram features required high computational overhead because of the size of feature space. This paper proposes the augmentation of domain knowledge in the form of known Snort malware signatures to machine learning techniques to reduce resources (in terms of the time to generate machine learning model and the memory usage to store generative model). Although current malware can be encrypted or mutated, these malware still exhibit prevalent contents or payloads as their predecessors. Using a dataset of traffic captured from a campus network, our approach is able to reduce initial generated million n-gram features to only around 90000 features, which significantly reduces processing time to generate naive Bayes model by 95%. The generated model that has been trained by the most descriptive features (4-gram Snort signatures with high information gain) produces lower false negative, about 2% compared with other models. Moreover, the proposed method is capable of detecting 10 new malware variants with 0% false negative. The findings from this paper can be the basis for improving malware classification based on content classification to detect known and new malware
Item Type: | Article |
---|---|
Uncontrolled Keywords: | network security, new malware variants |
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Divisions: | Electrical Engineering |
ID Code: | 55819 |
Deposited By: | Fazli Masari |
Deposited On: | 06 Oct 2016 06:09 |
Last Modified: | 15 Feb 2017 01:08 |
Repository Staff Only: item control page