Abstract
The new technique of botnet detection which bots use polymorphic code was proposed. Performed detection is based on the multi-agent system by means of antiviral agents that contain sensors. For detection of botnet, which bots use polymorphic code, the levels of polymorphism were investigated and its models were built. A new sensor for polymorphic code detection within antivirus agent of multi-agent system was developed. Developed sensor performs provocative actions against probably infected file, restarts of the suspicious file for probably modified code detection, behavior analysis for modified code detection, based on the principles of known levels of polymorphism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Oxford Dictionaries, http://www.oxforddictionaries.com/definition/english/botnet?q=botnet
Nikitina, T.: (In Virut have taken away key domains). http://www.securelist.com/ru/blog/207764413/U_Virut_otobrali_klyuchevye_domeny#page_top (2013)
Yaneza, J.: ZeuS/ZBOT Malware Shapes Up in 2013 (2013), http://blog.trendmicro.com/trendlabs-security-intelligence/zeuszbot-malware-shapes-up-in-2013/
Scott, M.E.: Boston Marathon/West, Texas Spam Campaigns (2013), http://mrpdchief.blogspot.com/2013/04/boston-marathonwest-texas-spam-campaigns.html
Szor, P.: The Art of Computer Virus Research and Defense, p. 744. Addison-Wesley Professional (2005)
Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2004, pp. 470–478. ACM, New York (2004)
Ye, Y., Wang, D., Li, T., Ye, D.: Imds: intelligent malware detection system. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2007, pp. 1043–1047. ACM, New York (2007)
Griffin, K., Schneider, S., Hu, X., Chiueh, T.-c.: Automatic generation of string signatures for malware detection. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 101–120. Springer, Heidelberg (2009)
Yan, W., Wu, E.: Toward automatic discovery of malware signature for anti-virus cloud computing. In: Zhou, J. (ed.) Complex 2009. LNICST, vol. 4, pp. 724–728. Springer, Heidelberg (2009)
Wang, J.-H., Deng, P., Fan, Y.-S., Jaw, L.-J., Liu, Y.-C.: Virus detection using data mining techinques. In: Proceedings of the IEEE 37th Annual 2003 International Carnahan Conference on Security Technology (2003)
Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proc. of the 12th USENIX Security Symposium, pp. 169–186 (2003)
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: Control flow graphs as malware signatures. In: Filiol, E., Marion, J.-Y., Bonfante, G. (eds.) International Workshop on the Theory of Computer Viruses TCV 2007, Nancy, France (2007)
Clarke, E., Emerson, E.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: Kozen, D. (ed.) Logic of Programs 1981. LNCS, vol. 131, pp. 52–71. Springer, Heidelberg (1982)
Leder, F., Steinbock, B., Martini, P.: Classification and detection of metamorphic malware using value set analysis. In: 2009 4th International Malicious and Unwanted Software (MALWARE), pp. 39–46 (2009)
Preda, M.D., Christodorescu, M., Jha, S., Debray, S.: A semanticsbased approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5), 1–54 (2008)
Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A.: Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2013. CCIS, vol. 370, pp. 146–156. Springer, Heidelberg (2013)
Glossary (2014), http://home.mcafee.com/virusinfo/glossary?ctst=1#P
Kaspersky, E.: Computer viruses. SK-Press, Moscow (1998)
Jokinen, P., Tarhio, J., Ukkonen, E.: A Comparison of Approximate String Matching Algorithms. Software: Practice and Experience 26(12), 1439–1458 (1996), http://onlinelibrary.wiley.com/doi/10.1002/SICI1097-024X19961226:121439:AID-SPE713.0.CO;2-1/abstract
Smyth, B.: Computing Patterns in Strings, p. 496. Williams, Moscow (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., Nicheporuk, A. (2014). A Technique for Detection of Bots Which Are Using Polymorphic Code. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2014. Communications in Computer and Information Science, vol 431. Springer, Cham. https://doi.org/10.1007/978-3-319-07941-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-07941-7_27
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07940-0
Online ISBN: 978-3-319-07941-7
eBook Packages: Computer ScienceComputer Science (R0)