All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks

02/03/2021
by   Zainab Abaid, et al.
0

Many techniques have been proposed for quickly detecting and containing malware-generated network attacks such as large-scale denial of service attacks; unfortunately, much damage is already done within the first few minutes of an attack, before it is identified and contained. There is a need for an early warning system that can predict attacks before they actually manifest, so that upcoming attacks can be prevented altogether by blocking the hosts that are likely to engage in attacks. However, blocking responses may disrupt legitimate processes on blocked hosts; in order to minimise user inconvenience, it is important to also foretell the time when the predicted attacks will occur, so that only the most urgent threats result in auto-blocking responses, while less urgent ones are first manually investigated. To this end, we identify a typical infection sequence followed by modern malware; modelling this sequence as a Markov chain and training it on real malicious traffic, we are able to identify behaviour most likely to lead to attacks and predict 98% of real-world spamming and port-scanning attacks before they occur. Moreover, using a Semi-Markov chain model, we are able to foretell the time of upcoming attacks, a novel capability that allows accurately predicting the times of 97 represents an important and timely step towards enabling flexible threat response models that minimise disruption to legitimate users.

READ FULL TEXT
research
05/23/2019

Characterizing Certain DNS DDoS Attacks

This paper details data science research in the area of Cyber Threat Int...
research
07/05/2022

Malware and Ransomware Detection Models

Cybercrime is one of the major digital threats of this century. In parti...
research
01/20/2020

A Secure and Smart Framework for Preventing Ransomware Attack

Nowadays security is major concern for any user connected to the interne...
research
08/26/2020

SIGL: Securing Software Installations Through Deep Graph Learning

Many users implicitly assume that software can only be exploited after i...
research
11/02/2018

Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware

Malware still constitutes a major threat in the cybersecurity landscape,...
research
11/09/2022

Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals

Network operators and system administrators are increasingly overwhelmed...
research
04/02/2019

DNS-Morph: UDP-Based Bootstrapping Protocol For Tor

Tor is one of the most popular systems for anonymous communication and c...

Please sign up or login with your details

Forgot password? Click here to reset