How Different Are Malware Collected Actively and Passively?
نویسندگان
چکیده
-A new open-source tool chain with malware collection, detection, and analysis is presented, evaluated, and open sourced. It actively collects malware through two channels: web-links and peer-to-peer. Then it detects malware with multiple anti-virus scanners and analyzes their host and network activities on virtual machines. The evaluation shows the differences between the malware collected by the traditional passive honeypot approach and this active approach, in the aspects of distribution, timeliness, and degree of network and host activity, i.e., activeness. These two collections are quite distinct and disjoint. Among the 800 and 354 malware programs collected in one month actively and passively, respectively, 79% of the passively captured malware are active bots and 59% of the actively captured malware are passive Trojans. 16% of actively captured are zero-day malware, but no zero-day malware had been captured by the passive approach. Moreover, the passive approach receives mostly, 98%, malware with network behavior while the active approach collects both, i.e., 77% with network behavior and 23% with only host behavior or no action.
منابع مشابه
Large-Scale Analysis of Malware Downloaders
Downloaders are malicious programs with the goal to subversively download and install malware (eggs) on a victim’s machine. In this paper, we analyze and characterize 23 Windows-based malware downloaders. We first show a high diversity in downloaders’ communication architectures (e.g., P2P), carrier protocols and encryption schemes. Using dynamic malware analysis traces from over two years, we ...
متن کاملActively Learning to Attract Followers on Twitter
Twitter, a popular social network, presents great opportunities for on-line machine learning research. However, previous research has focused almost entirely on learning from passively collected data. We study the problem of learning to acquire followers through normative user behavior, as opposed to the mass following policies applied by many bots. We formalize the problem as a contextual band...
متن کاملPhysician-assisted suicide: a common law roadmap for state courts.
Part I examines the development of the law legalizing passively hastening death and how this development relied significantly on distinguishing passively hastening death from actively hastening death. Part II subjects the arguments used to legitimate passively hastening death to a traditional criminal law analysis and demonstrates their weaknesses which were simple to conceal when there was lit...
متن کاملADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems
With the rising threat of smartphone malware, both academic community and commercial anti-virus companies proposed many methodologies and products to defend against smartphone malware. Thus, how to assess the effectiveness of these defense mechanisms against existing and unknown malware becomes important. We propose ADAM, an automated and extensible system that can evaluate, via large-scale str...
متن کاملConcurrence of Nosocomial Infections with Microorganisms Spreading in the Air of Hospital Wards
Abstract Background and objectives: A Nosocomial infection is one of the Leading problems causing high mortality among hospitalized patients. This study aimed at confirming the concurrence of Nosocomial infections with microorganisms spreading in the air of hospital wards. Material and Methods: This study was conducted in 2009 at ValieAsr Hospital in Tehran, Iran. The Samples were taken from th...
متن کامل