Classification of Exploit-Kit behaviors via machine learning approach

© 2018 Global IT Research Institute (GiRI). An Exploit-Kit (EK) is the cyber attacking tool which targets in finding vulnerabilities appeared on a web browser instance such as web-plugins, add-on instances usually installed in a web browser. Such instances may send some suitable malware payload thro...

Full description

Saved in:
Bibliographic Details
Main Authors: Sukritta Harnmetta, Sudsanguan Ngamsuriyaroj
Other Authors: Mahidol University
Format: Conference or Workshop Item
Published: 2019
Subjects:
Online Access:https://repository.li.mahidol.ac.th/handle/123456789/45816
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Mahidol University
id th-mahidol.45816
record_format dspace
spelling th-mahidol.458162019-08-23T18:08:06Z Classification of Exploit-Kit behaviors via machine learning approach Sukritta Harnmetta Sudsanguan Ngamsuriyaroj Mahidol University Engineering © 2018 Global IT Research Institute (GiRI). An Exploit-Kit (EK) is the cyber attacking tool which targets in finding vulnerabilities appeared on a web browser instance such as web-plugins, add-on instances usually installed in a web browser. Such instances may send some suitable malware payload through the vulnerabilities they found. This kind of such cyber-attack is known as the drive-by-download attack where malware downloading do not require any interaction from users. In addition, EK can do self-protection by imitating a benign website or responding to end-users with HTTP 404 error code whenever it encountered an unsupported target web browser. As a result, detecting EK requires a lot of effort. However, when an EK launches an attack, there are some patterns of interactions between a host and a victim. In this work, we obtain a set of data from www.malware-traffic-analysis.net and analyze those interactions in order to identify a set of features. We use such features to build a model for classifying interaction patterns of each EK type. Our experiments show that, with 5,743 network flows and 45 features, our model using Decision tree approach can classify EK traffic and EK type with accuracy of 97.74% and 97.11% respectively. In conclusion, our proposed work can help detect the behavior of EK with high accuracy. 2019-08-23T11:08:06Z 2019-08-23T11:08:06Z 2018-03-23 Conference Paper International Conference on Advanced Communication Technology, ICACT. Vol.2018-February, (2018), 468-473 10.23919/ICACT.2018.8323798 17389445 2-s2.0-85046744146 https://repository.li.mahidol.ac.th/handle/123456789/45816 Mahidol University SCOPUS https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85046744146&origin=inward
institution Mahidol University
building Mahidol University Library
continent Asia
country Thailand
Thailand
content_provider Mahidol University Library
collection Mahidol University Institutional Repository
topic Engineering
spellingShingle Engineering
Sukritta Harnmetta
Sudsanguan Ngamsuriyaroj
Classification of Exploit-Kit behaviors via machine learning approach
description © 2018 Global IT Research Institute (GiRI). An Exploit-Kit (EK) is the cyber attacking tool which targets in finding vulnerabilities appeared on a web browser instance such as web-plugins, add-on instances usually installed in a web browser. Such instances may send some suitable malware payload through the vulnerabilities they found. This kind of such cyber-attack is known as the drive-by-download attack where malware downloading do not require any interaction from users. In addition, EK can do self-protection by imitating a benign website or responding to end-users with HTTP 404 error code whenever it encountered an unsupported target web browser. As a result, detecting EK requires a lot of effort. However, when an EK launches an attack, there are some patterns of interactions between a host and a victim. In this work, we obtain a set of data from www.malware-traffic-analysis.net and analyze those interactions in order to identify a set of features. We use such features to build a model for classifying interaction patterns of each EK type. Our experiments show that, with 5,743 network flows and 45 features, our model using Decision tree approach can classify EK traffic and EK type with accuracy of 97.74% and 97.11% respectively. In conclusion, our proposed work can help detect the behavior of EK with high accuracy.
author2 Mahidol University
author_facet Mahidol University
Sukritta Harnmetta
Sudsanguan Ngamsuriyaroj
format Conference or Workshop Item
author Sukritta Harnmetta
Sudsanguan Ngamsuriyaroj
author_sort Sukritta Harnmetta
title Classification of Exploit-Kit behaviors via machine learning approach
title_short Classification of Exploit-Kit behaviors via machine learning approach
title_full Classification of Exploit-Kit behaviors via machine learning approach
title_fullStr Classification of Exploit-Kit behaviors via machine learning approach
title_full_unstemmed Classification of Exploit-Kit behaviors via machine learning approach
title_sort classification of exploit-kit behaviors via machine learning approach
publishDate 2019
url https://repository.li.mahidol.ac.th/handle/123456789/45816
_version_ 1763490878271258624