Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic

  • Authors:
  • Yuval Elovici;Asaf Shabtai;Robert Moskovitch;Gil Tahan;Chanan Glezer

  • Affiliations:
  • Deutsche Telekom Laboratories at Ben-Gurion University, Be'er Sheva, 84105, Israel;Deutsche Telekom Laboratories at Ben-Gurion University, Be'er Sheva, 84105, Israel;Deutsche Telekom Laboratories at Ben-Gurion University, Be'er Sheva, 84105, Israel;Deutsche Telekom Laboratories at Ben-Gurion University, Be'er Sheva, 84105, Israel;Deutsche Telekom Laboratories at Ben-Gurion University, Be'er Sheva, 84105, Israel

  • Venue:
  • KI '07 Proceedings of the 30th annual German conference on Advances in Artificial Intelligence
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Early Detection, Alert and Response (eDare) system is aimed at purifying Web traffic propagating via the premises of Network Service Providers (NSP) from malicious code. To achieve this goal, the system employs powerful network traffic scanners capable of cleaning traffic from known malicious code. The remaining traffic is monitored and Machine Learning (ML) algorithms are invoked in an attempt to pinpoint unknown malicious code exhibiting suspicious morphological patterns. Decision trees, Neural Networks and Bayesian Networks are used for static code analysis in order to determine whether a suspicious executable file actually inhabits malicious code. These algorithms are being evaluated and preliminary results are encouraging.