2009 First International Communication Systems and Networks and Workshops 2009
DOI: 10.1109/comsnets.2009.4808876
|View full text |Cite
|
Sign up to set email alerts
|

An empirical study of malware evolution

Abstract: Abstract-The diversity, sophistication and availability of malicious software (malcode/malware) pose enormous challenges for securing networks and end hosts from attacks. In this paper, we analyze a large corpus of malcode meta data compiled over a period of 19 years. Our aim is to understand how malcode has evolved over the years, and in particular, how different instances of malcode relate to one another. We develop a novel graph pruning technique to establish the inheritance relationships between different … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(26 citation statements)
references
References 16 publications
0
26
0
Order By: Relevance
“…These methods do not identify ancestral relationships in the data, but do give similarity relationships. However, it is more informative to know the set of parents from which a given sample's functionality is derived . Most similar to this paper is the method of using the graphical lasso, an undirected graphical model, with post hoc assignment of edge direction by a domain expert.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…These methods do not identify ancestral relationships in the data, but do give similarity relationships. However, it is more informative to know the set of parents from which a given sample's functionality is derived . Most similar to this paper is the method of using the graphical lasso, an undirected graphical model, with post hoc assignment of edge direction by a domain expert.…”
Section: Related Workmentioning
confidence: 99%
“…We compare against other algorithms that have been used for learning malware phylogeny. The algorithms that we compare against are MKLGC , which uses a graphical lasso with multiple kernel learning plus clustering of malware programs; Gupta , a graph pruning algorithm; and the minimum spanning tree as a naive baseline. These 3 algorithms each produce a single network as output, instead of an expectation on each edge as our Bayesian network discovery algorithm produces.…”
Section: Application To Malware Characterizationmentioning
confidence: 99%
See 1 more Smart Citation
“…During a campaign, an adversary typically recycles techniques from previous ones and evolves its campaign slowly over time. For example, a new malware campaign may use a vulnerability known from a previous attack but use a delivery mechanism that changes to avoid detection [15]. Spam emails also tend to evolve from previous ones by, for example, selling the same product but under a different (misspelled) name [23].…”
Section: Families and Isolationmentioning
confidence: 99%
“…[17] used metadata (such as time of collection and analyst notations) compiled by McAfee in a knowledge-based approach to lineage reconstruction. Lineage reconstruction using only features from malware binaries is essentially a new problem.…”
Section: B Detecting Shared or Similar Codementioning
confidence: 99%