Pinpointing malicious activities through network and system-level malware execution behavior

  • Authors:
  • André Ricardo Abed Grégio;Vitor Monte Afonso;Dario Simões Fernandes Filho;Paulo Lício de Geus;Mario Jino;Rafael Duarte Coelh dos Santos

  • Affiliations:
  • Renato Archer IT Research Center (CTI/MCT), Campinas, SP, Brazil,University of Campinas (Unicamp), Campinas, SP, Brazil;University of Campinas (Unicamp), Campinas, SP, Brazil;University of Campinas (Unicamp), Campinas, SP, Brazil;University of Campinas (Unicamp), Campinas, SP, Brazil;University of Campinas (Unicamp), Campinas, SP, Brazil;Brazilian Institute for Space Research (INPE/MCT), S. J. dos Campos, SP, Brazil

  • Venue:
  • ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malicious programs pose a major threat to Internet-connected systems, increasing the importance of studying their behavior in order to fight against them. In this paper, we propose definitions to the different types of behavior that a program can present during its execution. Based on those definitions, we define suspicious behavior as the group of actions that change the state of a target system. We also propose a set of network and system-level dangerous activities that can be used to denote the malignity in suspicious behaviors, which were extracted from a large set of malware samples. In addition, we evaluate the malware samples according to their suspicious behavior. Moreover, we developed filters to translate from lower-level execution traces to the observed dangerous activities and evaluated them in the context of actual malware.