Malware dection using IP flow level attributes

Although the task of malware detection in network traffic had been done successfully through Deep Packet Inspection (DPI) in the last two decades, this approach is becoming less efficient due to the continuous increasing of network traffic volumes and speeds and concerns on user's privacy. The...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdalla, Ahmed, A. Jamil, Haitham, Hamza Ibrahim, Hamza Awad, Mohd. Nor, Sulaiman
Format: Article
Language:English
Published: Asian Research Publishing Network (ARPN) 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/49662/1/SulaimanMohd.Nor2013_MalwaredectionusingIP.pdf
http://eprints.utm.my/id/eprint/49662/
http://www.jatit.org
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.49662
record_format eprints
spelling my.utm.496622018-10-14T08:26:33Z http://eprints.utm.my/id/eprint/49662/ Malware dection using IP flow level attributes Abdalla, Ahmed A. Jamil, Haitham Hamza Ibrahim, Hamza Awad Mohd. Nor, Sulaiman QA76 Computer software Although the task of malware detection in network traffic had been done successfully through Deep Packet Inspection (DPI) in the last two decades, this approach is becoming less efficient due to the continuous increasing of network traffic volumes and speeds and concerns on user's privacy. The recent alternative approach is the flow-based detection which has the ability to inspect high speed and backbone network traffic because it significantly aggregates and reduces the inspected data. However, the capability of this approach to detect packet-based attacks such as viruses and trojans is questionable because of the absence of the actual data at the payload level. In this paper we proof through experiments the ability to detect network flows that contain malicious packets that had been previously marked as malicious by Snort using only flow level attributes using several Machine Learning (ML) classifiers. We created our dataset from captured traces of a subnet of our university's network. The detection accuracy is found to be 75% True Positive (TP) with almost zero False Negative which we consider as a verification of the capability of flow-based approach to detect malware. This finding is encouraging for future researches where it can be combined with more traditional detection methods to form more powerful NIDSs Asian Research Publishing Network (ARPN) 2013 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/49662/1/SulaimanMohd.Nor2013_MalwaredectionusingIP.pdf Abdalla, Ahmed and A. Jamil, Haitham and Hamza Ibrahim, Hamza Awad and Mohd. Nor, Sulaiman (2013) Malware dection using IP flow level attributes. Journal of Theoretical and Applied Information Technology, 57 (3). pp. 530-539. ISSN 1992-8645 http://www.jatit.org
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Abdalla, Ahmed
A. Jamil, Haitham
Hamza Ibrahim, Hamza Awad
Mohd. Nor, Sulaiman
Malware dection using IP flow level attributes
description Although the task of malware detection in network traffic had been done successfully through Deep Packet Inspection (DPI) in the last two decades, this approach is becoming less efficient due to the continuous increasing of network traffic volumes and speeds and concerns on user's privacy. The recent alternative approach is the flow-based detection which has the ability to inspect high speed and backbone network traffic because it significantly aggregates and reduces the inspected data. However, the capability of this approach to detect packet-based attacks such as viruses and trojans is questionable because of the absence of the actual data at the payload level. In this paper we proof through experiments the ability to detect network flows that contain malicious packets that had been previously marked as malicious by Snort using only flow level attributes using several Machine Learning (ML) classifiers. We created our dataset from captured traces of a subnet of our university's network. The detection accuracy is found to be 75% True Positive (TP) with almost zero False Negative which we consider as a verification of the capability of flow-based approach to detect malware. This finding is encouraging for future researches where it can be combined with more traditional detection methods to form more powerful NIDSs
format Article
author Abdalla, Ahmed
A. Jamil, Haitham
Hamza Ibrahim, Hamza Awad
Mohd. Nor, Sulaiman
author_facet Abdalla, Ahmed
A. Jamil, Haitham
Hamza Ibrahim, Hamza Awad
Mohd. Nor, Sulaiman
author_sort Abdalla, Ahmed
title Malware dection using IP flow level attributes
title_short Malware dection using IP flow level attributes
title_full Malware dection using IP flow level attributes
title_fullStr Malware dection using IP flow level attributes
title_full_unstemmed Malware dection using IP flow level attributes
title_sort malware dection using ip flow level attributes
publisher Asian Research Publishing Network (ARPN)
publishDate 2013
url http://eprints.utm.my/id/eprint/49662/1/SulaimanMohd.Nor2013_MalwaredectionusingIP.pdf
http://eprints.utm.my/id/eprint/49662/
http://www.jatit.org
_version_ 1643652746137567232