Loading…

Retrospective detection of malware attacks by cloud computing

As malware becomes pervasive and fast-evolving on the Internet, every computer linking to the outer world faces the risks of malware attacks. Therefore, it is important to not only detect malware as early as possible but also to determine which computer has been attacked. Among the various methods t...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Shun-Te, Chen, Yi-Ming
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 517
container_issue
container_start_page 510
container_title
container_volume
creator Liu, Shun-Te
Chen, Yi-Ming
description As malware becomes pervasive and fast-evolving on the Internet, every computer linking to the outer world faces the risks of malware attacks. Therefore, it is important to not only detect malware as early as possible but also to determine which computer has been attacked. Among the various methods to find and trace the existence of malware, retrospective detection is promising one. Once a threat is identified, it allows one to determine exactly which host or users open similar files by searching historical information. In the past, the huge volume of historical information represents an insurmountable barrier to such traces. Fortunately, with the evolution of cloud computing technologies, this barrier can be broken. In this paper, we propose a new retrospective detection approach based on Portable Executable (PE) format file relationships. We implement our system in a Hadoop platform and use 18 real-world malware to do effective and efficient tests. Our results show that our system has a higher detection rate as well as a lower false positive rate than the famous Splunk tool. We also find that, although cloud computing is suitable for processing a small number of huge files, it has shortcomings in dealing with a large number of small files.
doi_str_mv 10.1109/CyberC.2010.99
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5616975</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5616975</ieee_id><sourcerecordid>5616975</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-4dac8243e26d07df438b4bff6add52cc5afa5f7b60d828acad0e57d3cd98baff3</originalsourceid><addsrcrecordid>eNotjM1KxDAYRSMiqGO3btzkBTqm-c_ChRT_YECQ2Q9fki9SbaclzSh9e0f0bs7hLC4h1w1bNw1zt-3iMbdrzo7BuRNSOWOZ0U5JLpQ6JZeN5FJaKSQ7J9U8f7DjpOKcqwty94Ylj_OEoXRfSCOWXxv3dEx0gP4bMlIoBcLnTP1CQz8eIg3jMB1Kt3-_ImcJ-hmrf67I9vFh2z7Xm9enl_Z-U3eOlVpGCJZLgVxHZmKSwnrpU9IQo-IhKEigkvGaRcstBIgMlYkiRGc9pCRW5ObvtkPE3ZS7AfKyU7rRzijxAzuDS3s</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Retrospective detection of malware attacks by cloud computing</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Liu, Shun-Te ; Chen, Yi-Ming</creator><creatorcontrib>Liu, Shun-Te ; Chen, Yi-Ming</creatorcontrib><description>As malware becomes pervasive and fast-evolving on the Internet, every computer linking to the outer world faces the risks of malware attacks. Therefore, it is important to not only detect malware as early as possible but also to determine which computer has been attacked. Among the various methods to find and trace the existence of malware, retrospective detection is promising one. Once a threat is identified, it allows one to determine exactly which host or users open similar files by searching historical information. In the past, the huge volume of historical information represents an insurmountable barrier to such traces. Fortunately, with the evolution of cloud computing technologies, this barrier can be broken. In this paper, we propose a new retrospective detection approach based on Portable Executable (PE) format file relationships. We implement our system in a Hadoop platform and use 18 real-world malware to do effective and efficient tests. Our results show that our system has a higher detection rate as well as a lower false positive rate than the famous Splunk tool. We also find that, although cloud computing is suitable for processing a small number of huge files, it has shortcomings in dealing with a large number of small files.</description><identifier>ISBN: 1424484340</identifier><identifier>ISBN: 9781424484348</identifier><identifier>EISBN: 9780769542355</identifier><identifier>EISBN: 0769542352</identifier><identifier>DOI: 10.1109/CyberC.2010.99</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cloud computing ; Hadoop ; Malware ; Monitoring ; retrospective detection</subject><ispartof>2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2010, p.510-517</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5616975$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5616975$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, Shun-Te</creatorcontrib><creatorcontrib>Chen, Yi-Ming</creatorcontrib><title>Retrospective detection of malware attacks by cloud computing</title><title>2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery</title><addtitle>cyberc</addtitle><description>As malware becomes pervasive and fast-evolving on the Internet, every computer linking to the outer world faces the risks of malware attacks. Therefore, it is important to not only detect malware as early as possible but also to determine which computer has been attacked. Among the various methods to find and trace the existence of malware, retrospective detection is promising one. Once a threat is identified, it allows one to determine exactly which host or users open similar files by searching historical information. In the past, the huge volume of historical information represents an insurmountable barrier to such traces. Fortunately, with the evolution of cloud computing technologies, this barrier can be broken. In this paper, we propose a new retrospective detection approach based on Portable Executable (PE) format file relationships. We implement our system in a Hadoop platform and use 18 real-world malware to do effective and efficient tests. Our results show that our system has a higher detection rate as well as a lower false positive rate than the famous Splunk tool. We also find that, although cloud computing is suitable for processing a small number of huge files, it has shortcomings in dealing with a large number of small files.</description><subject>Cloud computing</subject><subject>Hadoop</subject><subject>Malware</subject><subject>Monitoring</subject><subject>retrospective detection</subject><isbn>1424484340</isbn><isbn>9781424484348</isbn><isbn>9780769542355</isbn><isbn>0769542352</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjM1KxDAYRSMiqGO3btzkBTqm-c_ChRT_YECQ2Q9fki9SbaclzSh9e0f0bs7hLC4h1w1bNw1zt-3iMbdrzo7BuRNSOWOZ0U5JLpQ6JZeN5FJaKSQ7J9U8f7DjpOKcqwty94Ylj_OEoXRfSCOWXxv3dEx0gP4bMlIoBcLnTP1CQz8eIg3jMB1Kt3-_ImcJ-hmrf67I9vFh2z7Xm9enl_Z-U3eOlVpGCJZLgVxHZmKSwnrpU9IQo-IhKEigkvGaRcstBIgMlYkiRGc9pCRW5ObvtkPE3ZS7AfKyU7rRzijxAzuDS3s</recordid><startdate>201010</startdate><enddate>201010</enddate><creator>Liu, Shun-Te</creator><creator>Chen, Yi-Ming</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201010</creationdate><title>Retrospective detection of malware attacks by cloud computing</title><author>Liu, Shun-Te ; Chen, Yi-Ming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-4dac8243e26d07df438b4bff6add52cc5afa5f7b60d828acad0e57d3cd98baff3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Cloud computing</topic><topic>Hadoop</topic><topic>Malware</topic><topic>Monitoring</topic><topic>retrospective detection</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu, Shun-Te</creatorcontrib><creatorcontrib>Chen, Yi-Ming</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, Shun-Te</au><au>Chen, Yi-Ming</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Retrospective detection of malware attacks by cloud computing</atitle><btitle>2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery</btitle><stitle>cyberc</stitle><date>2010-10</date><risdate>2010</risdate><spage>510</spage><epage>517</epage><pages>510-517</pages><isbn>1424484340</isbn><isbn>9781424484348</isbn><eisbn>9780769542355</eisbn><eisbn>0769542352</eisbn><abstract>As malware becomes pervasive and fast-evolving on the Internet, every computer linking to the outer world faces the risks of malware attacks. Therefore, it is important to not only detect malware as early as possible but also to determine which computer has been attacked. Among the various methods to find and trace the existence of malware, retrospective detection is promising one. Once a threat is identified, it allows one to determine exactly which host or users open similar files by searching historical information. In the past, the huge volume of historical information represents an insurmountable barrier to such traces. Fortunately, with the evolution of cloud computing technologies, this barrier can be broken. In this paper, we propose a new retrospective detection approach based on Portable Executable (PE) format file relationships. We implement our system in a Hadoop platform and use 18 real-world malware to do effective and efficient tests. Our results show that our system has a higher detection rate as well as a lower false positive rate than the famous Splunk tool. We also find that, although cloud computing is suitable for processing a small number of huge files, it has shortcomings in dealing with a large number of small files.</abstract><pub>IEEE</pub><doi>10.1109/CyberC.2010.99</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424484340
ispartof 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2010, p.510-517
issn
language eng
recordid cdi_ieee_primary_5616975
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Cloud computing
Hadoop
Malware
Monitoring
retrospective detection
title Retrospective detection of malware attacks by cloud computing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T12%3A00%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Retrospective%20detection%20of%20malware%20attacks%20by%20cloud%20computing&rft.btitle=2010%20International%20Conference%20on%20Cyber-Enabled%20Distributed%20Computing%20and%20Knowledge%20Discovery&rft.au=Liu,%20Shun-Te&rft.date=2010-10&rft.spage=510&rft.epage=517&rft.pages=510-517&rft.isbn=1424484340&rft.isbn_list=9781424484348&rft_id=info:doi/10.1109/CyberC.2010.99&rft.eisbn=9780769542355&rft.eisbn_list=0769542352&rft_dat=%3Cieee_6IE%3E5616975%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-4dac8243e26d07df438b4bff6add52cc5afa5f7b60d828acad0e57d3cd98baff3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5616975&rfr_iscdi=true