Anti-malware vendors receive daily thousands of potentially malicious binaries to analyse and categorise before deploying the appropriate defence measure. Considering the limitations of existing malware analysis and classification methods, we present MalClassifier, a novel privacy-preserving system for the automatic analysis and classification of malware using network flow sequence mining. MalClassifier allows identifying the malware family behind detected malicious network activity without requiring access to the infected host or malicious executable reducing overall response time. MalClassifier abstracts the malware families’ network flow sequence order and semantics behaviour as an n-flow. By mining and extracting the distinctive n-flows...
With the increased uses of the Internet, the number of newly found malware keeps increasing every ye...
Malware are developed for various types of malicious attacks, e.g., to gain access to a user’s priva...
Malware family labels are known to be inconsistent. They are also black box since they do not repres...
Anti-malware vendors receive daily thousands of potentially malicious binaries to analyse and catego...
Economic incentives encourage malware authors to constantly develop new, increasingly complex malwar...
As the security landscape evolves over time, where thousands of species of malicious codes are seen ...
The staggering increase of malware families and their di- versity poses a significant threat and cre...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
The malicious codes are normally referred as malware. Systems are vulnerable to the traditional atta...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...
Malware is a major threat to security and privacy of network users. A large variety of malware is ty...
Variants of malware and exploits are emerging on the global canvas at an ever-increasing rate. Ther...
International audienceMalware is a major threat to security and privacy of network users. A large va...
The skyrocketing growth rate of new malware brings novel challenges to protect computers and network...
With the increased uses of the Internet, the number of newly found malware keeps increasing every ye...
Malware are developed for various types of malicious attacks, e.g., to gain access to a user’s priva...
Malware family labels are known to be inconsistent. They are also black box since they do not repres...
Anti-malware vendors receive daily thousands of potentially malicious binaries to analyse and catego...
Economic incentives encourage malware authors to constantly develop new, increasingly complex malwar...
As the security landscape evolves over time, where thousands of species of malicious codes are seen ...
The staggering increase of malware families and their di- versity poses a significant threat and cre...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
The malicious codes are normally referred as malware. Systems are vulnerable to the traditional atta...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...
Malware is a major threat to security and privacy of network users. A large variety of malware is ty...
Variants of malware and exploits are emerging on the global canvas at an ever-increasing rate. Ther...
International audienceMalware is a major threat to security and privacy of network users. A large va...
The skyrocketing growth rate of new malware brings novel challenges to protect computers and network...
With the increased uses of the Internet, the number of newly found malware keeps increasing every ye...
Malware are developed for various types of malicious attacks, e.g., to gain access to a user’s priva...
Malware family labels are known to be inconsistent. They are also black box since they do not repres...