Visible to the public "Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation"Conflict Detection Enabled

Title"Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation"
Publication TypeConference Paper
Year of Publication2015
AuthorsN. Nakagawa, Y. Teshigawara, R. Sasaki
Conference Name2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec)
Date PublishedOct
PublisherIEEE
ISBN Number978-1-4673-8499-5
Accession Number16091600
Keywordsadvanced persistent threat attacks, APT attacks, attacking infrastructure building phase, computer network security, computer security, Databases, digital forensics, Dynamic Responding, entry control measures, initial compromise phase, intrusion detection system, invasive software, IP networks, Malware, malware communication, malware detection system, malware responding system, mission execution phase, Network security, OpenFlow, OpenFlow technology, path control, penetration and exploration phase, Ports (Computers), Protocols, pubcrawl170101, virtual networks
Abstract

Advanced Persistent Threat (APT) attacks, which have become prevalent in recent years, are classified into four phases. These are initial compromise phase, attacking infrastructure building phase, penetration and exploration phase, and mission execution phase. The malware on infected terminals attempts various communications on and after the attacking infrastructure building phase. In this research, using OpenFlow technology for virtual networks, we developed a system of identifying infected terminals by detecting communication events of malware communications in APT attacks. In addition, we prevent information fraud by using OpenFlow, which works as real-time path control. To evaluate our system, we executed malware infection experiments with a simulation tool for APT attacks and malware samples. In these experiments, an existing network using only entry control measures was prepared. As a result, we confirm the developed system is effective.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7491560&isnumber=7491501
DOI10.1109/CyberSec.2015.18
Citation Key7491560