Mining Malware Command and Control Traces
Title | Mining Malware Command and Control Traces |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | McLaren, P., Russell, G., Buchanan, B. |
Conference Name | 2017 Computing Conference |
ISBN Number | 978-1-5090-5443-5 |
Keywords | advanced persistent threat, advanced persistent threats, anomaly based detection, Botnet, Classification algorithms, command and control, command and control systems, control channel, control payloads, control traces, controller commands, data mining, detecting botnets, effective anomaly based detection technique, Human Behavior, invasive software, Malware, malware detection rates, malware threats, Metrics, pattern classification, Pattern recognition, Payloads, pubcrawl, resilience, Resiliency, Scalability, security of data, telecommunication traffic |
Abstract | Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, which enables the malware to respond to controller commands. The detection of malware command and control channels could help prevent further malicious activity by cyber criminals using the malware. Detection of malware in network traffic is traditionally carried out by identifying specific patterns in packet payloads. Now bot writers encrypt the command and control payloads, making pattern recognition a less effective form of detection. This paper focuses instead on an effective anomaly based detection technique for bot and advanced persistent threats using a data mining approach combined with applied classification algorithms. After additional tuning, the final test on an unseen dataset, false positive rates of 0% with malware detection rates of 100% were achieved on two examined malware threats, with promising results on a number of other threats. |
URL | http://ieeexplore.ieee.org/document/8252185/ |
DOI | 10.1109/SAI.2017.8252185 |
Citation Key | mclaren_mining_2017 |
- Human behavior
- telecommunication traffic
- security of data
- Scalability
- Resiliency
- resilience
- pubcrawl
- Payloads
- Pattern recognition
- pattern classification
- Metrics
- malware threats
- malware detection rates
- malware
- invasive software
- advanced persistent threat
- effective anomaly based detection technique
- detecting botnets
- Data mining
- controller commands
- control traces
- control payloads
- control channel
- command and control systems
- command and control
- Classification algorithms
- botnet
- anomaly based detection
- advanced persistent threats