2013
DOI: 10.1007/978-3-642-38631-2_59
|View full text |Cite
|
Sign up to set email alerts
|

Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments

Abstract: Abstract. We propose a detection mechanism that takes the advantage of virtualized environment and combines both passive and active detection approaches for detecting bot malware. Our proposed passive detection agent lies in the virtual machine monitor to profile the bot behavior and check against it with other hosts. The proposed active detection agent that performs active bot fingerprinting can send specific stimulus to a host and examine if there exists expected triggered behavior. In our experiments, our s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Some were explicitly designed to improve or propose new sandbox techniques, while others simply relied on sandboxes to collect data to perform other experiments -such as modeling the behavior of samples, extracting new detection signatures, train a classifier, or report on the internals of certain malware characteristics (such as packing, use of encryption, etc.). [44]- [46], [94], [109] 1 2 [56], [108] 2 14 [21], [26], [35], [40], [43], [52], [70], [85], [91], [95], [100], [101], [105], [110] 3 7 [15], [65]- [67], [71], [81], [93] 4 1 [58] 5 13 [12], [13], [23], [29], [38], [50], [51], [69], [78], [88], [92], [102], [106] 8 2 [20], [89] 10 7 [24], [25], [36], [41], …”
Section: A Research Experimentsmentioning
confidence: 99%
“…Some were explicitly designed to improve or propose new sandbox techniques, while others simply relied on sandboxes to collect data to perform other experiments -such as modeling the behavior of samples, extracting new detection signatures, train a classifier, or report on the internals of certain malware characteristics (such as packing, use of encryption, etc.). [44]- [46], [94], [109] 1 2 [56], [108] 2 14 [21], [26], [35], [40], [43], [52], [70], [85], [91], [95], [100], [101], [105], [110] 3 7 [15], [65]- [67], [71], [81], [93] 4 1 [58] 5 13 [12], [13], [23], [29], [38], [50], [51], [69], [78], [88], [92], [102], [106] 8 2 [20], [89] 10 7 [24], [25], [36], [41], …”
Section: A Research Experimentsmentioning
confidence: 99%
“…Hsiao et al . proposed an approach that combines dynamic passive analysis and active fingerprinting for bot detection in virtualized environments . A passive detection agent on a virtual machine monitors its host for profiles of bot behavior and checks monitored behavior with behavior on other hosts.…”
Section: Related Workmentioning
confidence: 99%
“…Combining signature‐based and behavior‐based bot detection can maintain some advantages and overcome some critical disadvantages, such as the ineffectiveness of signature‐based detection against unknown bots and obfuscation techniques, and the high risk and low detection accuracy of behavior‐based detection. However, many challenges must be overcome in order to combine the two detection methods, such as how to assign weight to each method . Although there are many techniques for combining scores (linear discriminant analysis, quadratic discriminant analysis, machine learning, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Another possibility might be to know what are the processes that a given customer typically execute. Other possible applications are in the area of malware detection [26]. In this respect, running processes can be monitored to see if their workload is the same or it changes during time.…”
Section: Introductionmentioning
confidence: 99%