Detection of unknown computer worms based on behavioral classification of the host

نویسندگان

  • Robert Moskovitch
  • Yuval Elovici
  • Lior Rokach
چکیده

Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer behavior into malicious and benign. Anti viruses consisting on signature-based methods are helpless against new (unknown) computer worms. This paper focuses on the feasibility of accurately detecting unknown worm activity in individual computers while minimizing the required set of features collected from the monitored computer. A comprehensive experiment for testing the feasibility of detecting unknown computer worms, employing several computer configurations, background applications, and user activity, was performed. During the experiments 323 computer features were monitored by an agent that was developed. Four feature selection methods were used to reduce the amount of features and four learning algorithms were applied on the resulting feature subsets. The evaluation results suggests that using classification algorithms applied on only 20 features the mean detection accuracy exceeded 90%, and for specific unknown worms accuracy reached above 99%, while maintaining a low level of false positive rate.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Analysis of Behavioral Classification of Computer Networks and Early Warning System for Worm Detection

The effort required for detecting worm that threaten the reliability and stability of network resources is in the process of advancing, demanding increasingly sophisticated resources. A worm is a self-propagating program that infects other hosts based on a known vulnerability in network hosts. The spread of active worms does not need any human interaction. There is a growing demand for effectiv...

متن کامل

BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...

متن کامل

Detection of Fake Accounts in Social Networks Based on One Class Classification

Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...

متن کامل

An Unknown Input Observer for Fault Detection Based on Sliding Mode Observer in Electrical Steering Assist Systems

Steering assist system controls the force transfer behavior of the steering system and improves the steering probability of the vehicle. Moreover, it is an interface between the diver and vehicle. Fault detection in electrical assisted steering systems is a challenging problem due to frequently use of these systems. This paper addresses the fault detection and reconstruction in automotive elect...

متن کامل

Detection of Ornithobilharzia turkestanikum cercaria (trematoda) by nested-PCR in intermediate host snail, Lymnaea gedrosiana

  Trematodes are important in economic and public health. Ornithobilharzia turkestanicum (O. turkestanicum) is one of the important economic trematodes in domestic animals. Ornithobilharzia infection in intermediate host (Lymnaea gedrosiana ) can be detected by either exposing snails to light to induce cercarial shedding or by squeezing them between glass slides to detect parasites. The current...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computational Statistics & Data Analysis

دوره 52  شماره 

صفحات  -

تاریخ انتشار 2008