Abstract
Dynamic analysis of malware is widely used to obtain a better understanding of unknown software. While existing systems mainly focus on host-level activities of malware and limit the analysis period to a few minutes, we concentrate on the network behavior of malware over longer periods. We provide a comprehensive overview of typical malware network behavior by discussing the results that we obtained during the analysis of more than 100,000 malware samples. The resulting network behavior was dissected in our new analysis environment called Sandnet that complements existing systems by focusing on network traffic analysis. Our in-depth analysis of the two protocols that are most popular among malware authors, DNS and HTTP, helps to understand and characterize the usage of these prevalent protocols.
| Original language | English |
|---|---|
| Title of host publication | BADGERS 2011 |
| Subtitle of host publication | Proceedings of the 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security |
| Place of Publication | New York, NY |
| Publisher | ACM Press |
| Pages | 78-88 |
| Number of pages | 11 |
| ISBN (Print) | 978-1-4503-0768-0 |
| DOIs | |
| Publication status | Published - 17 Jun 2011 |
| Externally published | Yes |
| Event | 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2011 - Salzburg, Austria Duration: 10 Apr 2011 → 10 Apr 2011 Conference number: 1 |
Conference
| Conference | 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2011 |
|---|---|
| Abbreviated title | BADGERS 2011 |
| Country/Territory | Austria |
| City | Salzburg |
| Period | 10/04/11 → 10/04/11 |