Malware beaconing detection

Update Item Information
Publication Type thesis
School or College College of Engineering
Department Computing
Author Tripathi, Anand
Title Malware beaconing detection
Date 2018
Description Security professionals are in constant battle with the recent trend of sophisticated malware targeting organizations and governments to gain unauthorized access to confidential knowledge and intellectual property. Recent years have also seen the rise of botnets that are often used for sending spam emails, stealing information, as well as launching wide-scale distributed denial of service attacks. Many approaches have been proposed to detect malware infection, but they either rely on end-host installations or require deeppacket inspection for signature matching. In this work, we utilize a common behavior of malware called "beaconing", where an infected node communicates with a command and control server at regular intervals for reporting its liveliness, to detect the presence of malware on an infected node. Using statistical methods for finding periodicity in a time series generated from network flow records, we were able to identify nodes infected with malware present on a large organization network. We evaluated our detection system on a real-world traffic dataset to show the effectiveness of our approach.
Type Text
Publisher University of Utah
Dissertation Name Master of Science
Language eng
Rights Management (c) Anand Tripathi
Format Medium application/pdf
ARK ark:/87278/s6nd217v
Setname ir_etd
ID 1703491
Reference URL https://collections.lib.utah.edu/ark:/87278/s6nd217v
Back to Search Results