Pattern Mining for Future Attacks
نویسندگان
چکیده
Malware writers are constantly looking for new vulnerabilities in popular software applications to exploit for profit, and discovering such a flaw is literally equivalent to finding a gold mine. When a completely new vulnerability is found, and turned into what are called Zero Day attacks, they can often be critical and lead to data loss or breach of privacy. Zero Day vulnerabilities, by their very nature are notoriously hard to find, and the odds seem to be stacked in favour of the attacker. However, before a Zero Day attack is discovered, attackers stealthily test different payload delivery methods and their obfuscated variants, in an attempt to outsmart anti-malware protection, with varying degrees of success. Evidence of such failed attempts, if any, are available on the victim machines, and the challenge is to discover their signatures before they can be turned into exploits. Our goal in this paper is to search for such vulnerabilities and straighten the odds. We focus on Javascript files, and using a combination of pattern mining and learning, effectively find two new Zero Day vulnerabilities in Microsoft Internet Explorer, using code collected between June and November 2009.
منابع مشابه
Analysis and Forecast of Mining Accidents in Pakistan
In the mining sector, the barrier to obtain an efficient safety management system is the unavailability of future information regarding the accidents. This paper aims to use the auto-regressive integrated moving average (ARIMA) model, for the first time, to evaluate the underlying causes that affect the safety management system corresponding to the number of accidents and fatalities in the surf...
متن کاملDistributed Sequential Pattern Mining: A Survey and Future Scope
Distributed sequential pattern mining is the data mining method to discover sequential patterns from large sequential database on distributed environment. It is used in many wide applications including web mining, customer shopping record, biomedical analysis, scientific research, etc. A large research has been done on sequential pattern mining on various distributed environments like Grid, Had...
متن کاملA Soft Computing Model to Counter Terrorism
In the aftermath of September 11, the experts concluded that data mining could help it prevent future terrorist attacks. Experts are also concerned that in its zeal to apply technology to antiterrorism, the government could disrupt the crime-fighting processes of the agencies that are charged with finding and stopping terrorists before they act. The entire information or the evidence about a te...
متن کاملImproving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining
The intrusion detection system (IDS) is an important network security tool for securing computer and network systems. It is able to detect and monitor network traffic data. Snort IDS is an open-source network security tool. It can search and match rules with network traffic data in order to detect attacks, and generate an alert. However, the Snort IDS can detect only known attacks. Therefore, w...
متن کاملA Digital Forensic Tool for Cyber Crime Data mining
Digital forensics is the science of identifying, extracting, analysing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains emerging cyber crimes, forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data m...
متن کامل