On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware

05/01/2019
by   Saeed Valizadeh, et al.
0

In this paper, we investigate the importance of a defense system's learning rates to fight against the self-propagating class of malware such as worms and bots. To this end, we introduce a new propagation model based on the interactions between an adversary (and its agents) who wishes to construct a zombie army of a specific size, and a defender taking advantage of standard security tools and technologies such as honeypots (HPs) and intrusion detection and prevention systems (IDPSes) in the network environment. As time goes on, the defender can incrementally learn from the collected/observed attack samples (e.g., malware payloads), and therefore being able to generate attack signatures. The generated signatures then are used for filtering next attack traffic and thus containing the attacker's progress in its malware propagation mission. Using simulation and numerical analysis, we evaluate the efficacy of signature generation algorithms and in general any learning-based scheme in bringing an adversary's maneuvering in the environment to a halt as an adversarial containment strategy.

READ FULL TEXT
research
11/21/2017

DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification

This paper presents a novel deep learning based method for automatic mal...
research
03/01/2020

Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection

Network intrusion detection systems and antivirus software are essential...
research
08/08/2023

Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems

Malicious software is an integral part of cybercrime defense. Due to the...
research
11/23/2020

Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack

BACKGROUND: Machine learning-based security detection models have become...
research
07/09/2018

Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems

Security of information passing through the Internet is threatened by to...
research
08/05/2022

Modeling Self-Propagating Malware with Epidemiological Models

Self-propagating malware (SPM) has recently resulted in large financial ...
research
11/25/2018

Is Data Clustering in Adversarial Settings Secure?

Clustering algorithms have been increasingly adopted in security applica...

Please sign up or login with your details

Forgot password? Click here to reset