2022
DOI: 10.1109/access.2022.3145966
|View full text |Cite
|
Sign up to set email alerts
|

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns

Abstract: As cyberattacks become increasingly prevalent globally, there is a need to identify trends in these cyberattacks and take suitable countermeasures quickly. The darknet, an unused IP address space, is relatively conducive to observing and analyzing indiscriminate cyberattacks because of the absence of legitimate communication. Indiscriminate scanning activities by malware to spread their infections often show similar spatiotemporal patterns, and such trends are also observed on the darknet. To address the probl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…To solve this issue, we developed an AI-based solution that automatically detects the rise of new malware scanning activities earlier using a large-scale darknet environment (an observation environment using unused IP addresses) [9], [10]. As shown in Fig.…”
Section: Grasping Overall Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…To solve this issue, we developed an AI-based solution that automatically detects the rise of new malware scanning activities earlier using a large-scale darknet environment (an observation environment using unused IP addresses) [9], [10]. As shown in Fig.…”
Section: Grasping Overall Iotmentioning
confidence: 99%
“…6, this method focuses on the fact that scanning behavior from hosts infected with the same malware exhibits synchronized characteristics in terms of scanning methods, timing, etc., since the same scan transmission module is used to perform the scan. In other words, when synchronized scan behaviors are detected on the darknet, it can be determined that the group of hosts emitting those scans are infected with the same malware [10]. By using this method, we believe it is possible to catch signs of new malware activity at the earliest possible stage, detect infected host groups, and link this to incident response, including guiding vulnerable equipment users to countermeasures to minimize the damage caused by the malware.…”
Section: Grasping Overall Iotmentioning
confidence: 99%
“…Han.Cet al, [11] proposed the model by combining three different machine learning techniques into a single framework called Dark-TRACER, they have proposed algorithms that automatically estimate and detect anomalous spatiotemporal patterns of darknet traffic in real time. They also conducted quantitative experiments to assess this framework's capacity to detect these malware activities.…”
Section: Related Workmentioning
confidence: 99%