Controlling malware HTTP communications in dynamic analysis system using search engine

  title={Controlling malware HTTP communications in dynamic analysis system using search engine},
  author={Kazufumi Aoki and Takeshi Yagi and Makoto Iwamura and Mitsutaka Itoh},
  journal={2011 Third International Workshop on Cyberspace Safety and Security (CSS)},
Malware is one of the most serious threats on the Internet. Countermeasures have been developed, but still many users are infected. Detecting and preventing communication by infected users from the network side would effectively mitigate the threats of malware. For this, we need to collect information about the destinations or payloads of malware communication. Dynamic analysis is usually used to obtain this information. Since some malware requires access to the Internet, e.g., bots and… CONTINUE READING


Publications citing this paper.
Showing 1-10 of 10 extracted citations

Malware detection by token counting

2014 International Conference on Contemporary Computing and Informatics (IC3I) • 2014
View 4 Excerpts
Highly Influenced

Malware originated HTTP traffic detection utilizing cluster appearance ratio

2017 International Conference on Information Networking (ICOIN) • 2017
View 1 Excerpt

The method of detecting malware-infected hosts analyzing firewall and proxy logs

2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT) • 2015
View 1 Excerpt

Challenges in high accuracy of malware detection

2012 IEEE Control and System Graduate Research Colloquium • 2012
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 12 references

Design and implementation of high interaction client honeypot for drive-by­ download attacks

Containing conficker, httpwww.abs-comptech.comhomelheadlines newstaming-conficker-the-easy-way. P. Porras, +29 authors M. Itoh
IEICE Transaction on Commuications, VoI.E93-B, No.5, 2010. 6 • 2010
View 1 Excerpt

Anubis - analyzing unknown binaries

http://anubis.isec1ab. org/, 2009. • 2009
View 3 Excerpts

Sandbox analysis with controlled internet connection for observing temporal changes of mal­ ware behavior

K. Yoshioka, T. Kasama, T. Matsumoto
JWIS2009, 2009. • 2009
View 1 Excerpt

Know your enemy: Web application threats

J. Riden, M. M. Ryan McGeehan, Brian Engert
T he Honeynet Project, 2008. • 2008

Botnet C&C handling with DNS sinkhole

J. H. Cheol
View 1 Excerpt

Similar Papers

Loading similar papers…