A practical approach for detecting executable codes in network traffic

  • Authors:
  • Ikkyun Kim;Koohong Kang;YangSeo Choi;Daewon Kim;Jintae Oh;Kijun Han

  • Affiliations:
  • Information Security Research Division, ETRI, Daejeon, Korea;Dept. of Information and Communications Engineering, Seowon University, Chongju, South Korea;Information Security Research Division, ETRI, Daejeon, Korea;Information Security Research Division, ETRI, Daejeon, Korea;Information Security Research Division, ETRI, Daejeon, Korea;Dept. of Computer Engineering, Kyungpook National University, Daegu, South Korea

  • Venue:
  • APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The research on the detection of zero-day network attack and the signature generation is highlighted as an issue according to the outbreak of the new network attack is faster than a prediction. In this paper, we propose a very practical method that detects the executable codes within the network packet payload. It could be used as the key function of the signature generation against the zero-day attack or the high speed anomaly detection. The proposed heuristic method in this paper could be expressed in terms of visually classifying the characteristic of the instruction pattern of executable codes. And then we generalize this by applying the discrete parameter Markov chain. Our experimental study showed that the presented scheme could find all types of executable codes in our experiments.