A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis

  • Authors:
  • Masashi Eto;Kotaro Sonoda;Daisuke Inoue;Katsunari Yoshioka;Koji Nakao

  • Affiliations:
  • National Institute of Information and Communications Technology, Tokyo, Japan 184-8795;National Institute of Information and Communications Technology, Tokyo, Japan 184-8795;National Institute of Information and Communications Technology, Tokyo, Japan 184-8795;Yokohama National University, Yokohama, Japan 240-8501;National Institute of Information and Communications Technology, Tokyo, Japan 184-8795

  • Venue:
  • ICONIP '09 Proceedings of the 16th International Conference on Neural Information Processing: Part II
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network monitoring systems that detect and analyze malicious activities as well as counter them, are becoming increasingly important. As malwares, such as worms, viruses, and bots, can inflict significant damages on both the infrastructure and the end user, technologies for identifying such propagating malwares are in great demand. In the large-scale darknet monitoring operation, we can see that malwares have various kinds of scan patterns that involves choosing destination IP addresses. With a focus on such scan patterns, this paper proposes a novel concept of malware feature extraction and a distinct analysis method named ``SPectrum Analysis for Distinction and Extraction of malware features (SPADE).''Through several evaluations using real scan traffic, we show that SPADE has the significant advantage of recognizing the similarities and dissimilarities between the same and different types of malwares.