Characterizing Malcode Evolution

dc.contributor.authorGupta, Architen_US
dc.contributor.authorKuppili, Pavanen_US
dc.contributor.authorAkella, Adityaen_US
dc.contributor.authorBarford, Paulen_US
dc.date.accessioned2012-03-15T17:21:53Z
dc.date.available2012-03-15T17:21:53Z
dc.date.created2007en_US
dc.date.issued2007en_US
dc.description.abstractThe diversity, sophistication and availability of malicious software (malcode) pose enormous challenges for securing networks and end hosts from attacks. In this paper, we analyze a large corpus of malcode meta data compiled over a period of 19 years. Our aim is to understand how malcode has evolved over the years and in particular how different instances of malcode relate to one another. We develop a novel graph pruning technique to establish the underlying relationships between different instances of malcode based on temporal information and key common phrases identified in the malcode descriptions. Our algorithm enables a range of possible inheritance structures, which we investigate through extensive manual validation. The resulting ``most likely'' malcode family trees show unique structure and diverse characteristics. We present an evaluation of gross characteristics of malcode evolution and also drill down on the details of the most interesting and potentially dangerous malcode families. Our approach is not definitive and could be improved given better meta data. Nevertheless, it is our hope that this new perspective on malcode evolution will be of great help in the development of more effective defenses in the future.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1599en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60566
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleCharacterizing Malcode Evolutionen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1599.pdf
Size:
298.06 KB
Format:
Adobe Portable Document Format