Classification of packet contents for malware detection

  • Authors:
  • Irfan Ahmed;Kyung-Suk Lhee

  • Affiliations:
  • Information Security Institute, Queensland University of Technology, Brisbane, Australia;, Seoul, South-Korea

  • Venue:
  • Journal in Computer Virology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many existing schemes for malware detection are signature-based. Although they can effectively detect known malwares, they cannot detect variants of known malwares or new ones. Most network servers do not expect executable code in their in-bound network traffic, such as on-line shopping malls, Picasa, Youtube, Blogger, etc. Therefore, such network applications can be protected from malware infection by monitoring their ports to see if incoming packets contain any executable contents. This paper proposes a content-classification scheme that identifies executable content in incoming packets. The proposed scheme analyzes the packet payload in two steps. It first analyzes the packet payload to see if it contains multimedia-type data (such as $${{\tt avi, wmv, jpg})}$$ . If not, then it classifies the payload either as text-type (such as $${{\tt txt, jsp, asp})}$$ or executable. Although in our experiments the proposed scheme shows a low rate of false negatives and positives (4.69% and 2.53%, respectively), the presence of inaccuracies still requires further inspection to efficiently detect the occurrence of malware. In this paper, we also propose simple statistical and combinatorial analysis to deal with false positives and negatives.