Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
Considering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures against malwares especially related to zero-day attacks should be effectively developed in an urgent manner. Several research activities have been already carried out focusin...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Information and Systems 2009/05/01, Vol.E92.D(5), pp.787-798 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 798 |
---|---|
container_issue | 5 |
container_start_page | 787 |
container_title | IEICE Transactions on Information and Systems |
container_volume | E92.D |
creator | NAKAO, Koji INOUE, Daisuke ETO, Masashi YOSHIOKA, Katsunari |
description | Considering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures against malwares especially related to zero-day attacks should be effectively developed in an urgent manner. Several research activities have been already carried out focusing on statistic calculation of network events by means of global network sensors (so-called macroscopic approach) as well as on direct malware analysis such as code analysis (so-called microscopic approach). However, in the current research activities, it is not clear at all how to inter-correlate between network behaviors obtained from macroscopic approach and malware behaviors obtained from microscopic approach. In this paper, in one side, network behaviors observed from darknet are strictly analyzed to produce scan profiles, and in the other side, malware behaviors obtained from honeypots are correctly analyzed so as to produce a set of profiles containing malware characteristics. To this end, inter-relationship between above two types of profiles is practically discussed and studied so that frequently observed malwares behaviors can be finally identified in view of scan-malware chain. |
doi_str_mv | 10.1587/transinf.E92.D.787 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_889410183</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>889410183</sourcerecordid><originalsourceid>FETCH-LOGICAL-c557t-d7a369221c00c4ab419b6d26dc79f04617e2ea2b9573a6786a1f59e40bc534c3</originalsourceid><addsrcrecordid>eNpdkDFPGzEYhq2qSE1D_0Anb0wXbN_5fDemSVpAIJBgYrG-832Xmjh2ajtC-fccSsnA9C7P8w4PIT85m3HZqMscwSfrh9mqFbPlTDXqC5lwVcmClzX_Sias5XXRyFJ8I99TemGMN4LLCdk_RDDZGnB0EWJEB9kGT-ce3CHZRDvMr4iePhrwFHxP78C9QkT6EMNgHSYKa7A-ZfqMMRRLONB5zmA2if6ChD0dz5YQNx4zvQve5hCtX5-TswFcwh__d0qefq-eFlfF7f2f68X8tjBSqlz0Csq6FYIbxkwFXcXbru5F3RvVDqyquUKBILpWqhJq1dTAB9lixTojy8qUU3JxvN3F8G-PKeutTQadA49hn3TTtBUfS5QjKY6kiSGliIPeRbuFeNCc6ffC-qOwHgvrpR4Lj9LNUXpJGdZ4UiCOQR1-VuRpR_kEmb8QNfryDaKajiU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>889410183</pqid></control><display><type>article</type><title>Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring</title><source>J-STAGE Free</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>NAKAO, Koji ; INOUE, Daisuke ; ETO, Masashi ; YOSHIOKA, Katsunari</creator><creatorcontrib>NAKAO, Koji ; INOUE, Daisuke ; ETO, Masashi ; YOSHIOKA, Katsunari</creatorcontrib><description>Considering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures against malwares especially related to zero-day attacks should be effectively developed in an urgent manner. Several research activities have been already carried out focusing on statistic calculation of network events by means of global network sensors (so-called macroscopic approach) as well as on direct malware analysis such as code analysis (so-called microscopic approach). However, in the current research activities, it is not clear at all how to inter-correlate between network behaviors obtained from macroscopic approach and malware behaviors obtained from microscopic approach. In this paper, in one side, network behaviors observed from darknet are strictly analyzed to produce scan profiles, and in the other side, malware behaviors obtained from honeypots are correctly analyzed so as to produce a set of profiles containing malware characteristics. To this end, inter-relationship between above two types of profiles is practically discussed and studied so that frequently observed malwares behaviors can be finally identified in view of scan-malware chain.</description><identifier>ISSN: 0916-8532</identifier><identifier>ISSN: 1745-1361</identifier><identifier>EISSN: 1745-1361</identifier><identifier>DOI: 10.1587/transinf.E92.D.787</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>Chains ; Correlation analysis ; Countermeasures ; darknet malware analysis ; Focusing ; Mathematical analysis ; Monitoring ; network monitoring ; Networks ; sandbox ; Statistics</subject><ispartof>IEICE Transactions on Information and Systems, 2009/05/01, Vol.E92.D(5), pp.787-798</ispartof><rights>2009 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c557t-d7a369221c00c4ab419b6d26dc79f04617e2ea2b9573a6786a1f59e40bc534c3</citedby><cites>FETCH-LOGICAL-c557t-d7a369221c00c4ab419b6d26dc79f04617e2ea2b9573a6786a1f59e40bc534c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>NAKAO, Koji</creatorcontrib><creatorcontrib>INOUE, Daisuke</creatorcontrib><creatorcontrib>ETO, Masashi</creatorcontrib><creatorcontrib>YOSHIOKA, Katsunari</creatorcontrib><title>Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring</title><title>IEICE Transactions on Information and Systems</title><addtitle>IEICE Trans. Inf. & Syst.</addtitle><description>Considering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures against malwares especially related to zero-day attacks should be effectively developed in an urgent manner. Several research activities have been already carried out focusing on statistic calculation of network events by means of global network sensors (so-called macroscopic approach) as well as on direct malware analysis such as code analysis (so-called microscopic approach). However, in the current research activities, it is not clear at all how to inter-correlate between network behaviors obtained from macroscopic approach and malware behaviors obtained from microscopic approach. In this paper, in one side, network behaviors observed from darknet are strictly analyzed to produce scan profiles, and in the other side, malware behaviors obtained from honeypots are correctly analyzed so as to produce a set of profiles containing malware characteristics. To this end, inter-relationship between above two types of profiles is practically discussed and studied so that frequently observed malwares behaviors can be finally identified in view of scan-malware chain.</description><subject>Chains</subject><subject>Correlation analysis</subject><subject>Countermeasures</subject><subject>darknet malware analysis</subject><subject>Focusing</subject><subject>Mathematical analysis</subject><subject>Monitoring</subject><subject>network monitoring</subject><subject>Networks</subject><subject>sandbox</subject><subject>Statistics</subject><issn>0916-8532</issn><issn>1745-1361</issn><issn>1745-1361</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNpdkDFPGzEYhq2qSE1D_0Anb0wXbN_5fDemSVpAIJBgYrG-832Xmjh2ajtC-fccSsnA9C7P8w4PIT85m3HZqMscwSfrh9mqFbPlTDXqC5lwVcmClzX_Sias5XXRyFJ8I99TemGMN4LLCdk_RDDZGnB0EWJEB9kGT-ce3CHZRDvMr4iePhrwFHxP78C9QkT6EMNgHSYKa7A-ZfqMMRRLONB5zmA2if6ChD0dz5YQNx4zvQve5hCtX5-TswFcwh__d0qefq-eFlfF7f2f68X8tjBSqlz0Csq6FYIbxkwFXcXbru5F3RvVDqyquUKBILpWqhJq1dTAB9lixTojy8qUU3JxvN3F8G-PKeutTQadA49hn3TTtBUfS5QjKY6kiSGliIPeRbuFeNCc6ffC-qOwHgvrpR4Lj9LNUXpJGdZ4UiCOQR1-VuRpR_kEmb8QNfryDaKajiU</recordid><startdate>2009</startdate><enddate>2009</enddate><creator>NAKAO, Koji</creator><creator>INOUE, Daisuke</creator><creator>ETO, Masashi</creator><creator>YOSHIOKA, Katsunari</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2009</creationdate><title>Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring</title><author>NAKAO, Koji ; INOUE, Daisuke ; ETO, Masashi ; YOSHIOKA, Katsunari</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c557t-d7a369221c00c4ab419b6d26dc79f04617e2ea2b9573a6786a1f59e40bc534c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Chains</topic><topic>Correlation analysis</topic><topic>Countermeasures</topic><topic>darknet malware analysis</topic><topic>Focusing</topic><topic>Mathematical analysis</topic><topic>Monitoring</topic><topic>network monitoring</topic><topic>Networks</topic><topic>sandbox</topic><topic>Statistics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>NAKAO, Koji</creatorcontrib><creatorcontrib>INOUE, Daisuke</creatorcontrib><creatorcontrib>ETO, Masashi</creatorcontrib><creatorcontrib>YOSHIOKA, Katsunari</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Information and Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>NAKAO, Koji</au><au>INOUE, Daisuke</au><au>ETO, Masashi</au><au>YOSHIOKA, Katsunari</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring</atitle><jtitle>IEICE Transactions on Information and Systems</jtitle><addtitle>IEICE Trans. Inf. & Syst.</addtitle><date>2009</date><risdate>2009</risdate><volume>E92.D</volume><issue>5</issue><spage>787</spage><epage>798</epage><pages>787-798</pages><issn>0916-8532</issn><issn>1745-1361</issn><eissn>1745-1361</eissn><abstract>Considering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures against malwares especially related to zero-day attacks should be effectively developed in an urgent manner. Several research activities have been already carried out focusing on statistic calculation of network events by means of global network sensors (so-called macroscopic approach) as well as on direct malware analysis such as code analysis (so-called microscopic approach). However, in the current research activities, it is not clear at all how to inter-correlate between network behaviors obtained from macroscopic approach and malware behaviors obtained from microscopic approach. In this paper, in one side, network behaviors observed from darknet are strictly analyzed to produce scan profiles, and in the other side, malware behaviors obtained from honeypots are correctly analyzed so as to produce a set of profiles containing malware characteristics. To this end, inter-relationship between above two types of profiles is practically discussed and studied so that frequently observed malwares behaviors can be finally identified in view of scan-malware chain.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transinf.E92.D.787</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0916-8532 |
ispartof | IEICE Transactions on Information and Systems, 2009/05/01, Vol.E92.D(5), pp.787-798 |
issn | 0916-8532 1745-1361 1745-1361 |
language | eng |
recordid | cdi_proquest_miscellaneous_889410183 |
source | J-STAGE Free; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Chains Correlation analysis Countermeasures darknet malware analysis Focusing Mathematical analysis Monitoring network monitoring Networks sandbox Statistics |
title | Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T17%3A26%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Practical%20Correlation%20Analysis%20between%20Scan%20and%20Malware%20Profiles%20against%20Zero-Day%20Attacks%20Based%20on%20Darknet%20Monitoring&rft.jtitle=IEICE%20Transactions%20on%20Information%20and%20Systems&rft.au=NAKAO,%20Koji&rft.date=2009&rft.volume=E92.D&rft.issue=5&rft.spage=787&rft.epage=798&rft.pages=787-798&rft.issn=0916-8532&rft.eissn=1745-1361&rft_id=info:doi/10.1587/transinf.E92.D.787&rft_dat=%3Cproquest_cross%3E889410183%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=889410183&rft_id=info:pmid/&rfr_iscdi=true |