Beyond Labeling

Using Clustering to Build Network Behavioral Profiles of Malware Families

Book Chapter (2021)
Author(s)

Azqa Nadeem (TU Delft - Cyber Security)

Christian Hammerschmidt (TU Delft - Cyber Security)

Carlos Gañán (TU Delft - Organisation & Governance)

S.E. Verwer (TU Delft - Cyber Security)

Research Group
Cyber Security
Copyright
© 2021 A. Nadeem, C.A. Hammerschmidt, C. Hernandez Ganan, S.E. Verwer
DOI related publication
https://doi.org/10.1007/978-3-030-62582-5_15
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 A. Nadeem, C.A. Hammerschmidt, C. Hernandez Ganan, S.E. Verwer
Research Group
Cyber Security
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.@en
Pages (from-to)
381-409
ISBN (print)
978-3-030-62581-8
ISBN (electronic)
978-3-030-62582-5
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Malware family labels are known to be inconsistent. They are also black-box since they do not represent the capabilities of malware. The current state of the art in malware capability assessment includes mostly manual approaches, which are infeasible due to the ever-increasing volume of discovered malware samples. We propose a novel unsupervised machine learning-based method called MalPaCA, which automates capability assessment by clustering the temporal behavior in malware's network traces. MalPaCA provides meaningful behavioral clusters using only 20 packet headers. Behavioral profiles are generated based on the cluster membership of malware's network traces. A Directed Acyclic Graph shows the relationship between malwares according to their overlapping behaviors. The behavioral profiles together with the DAG provide more insightful characterization of malware than current family designations. We also propose a visualization-based evaluation method for the obtained clusters to assist practitioners in understanding the clustering results. We apply MalPaCA on a financial malware dataset collected in the wild that comprises 1.1 k malware samples resulting in 3.6 M packets. Our experiments show that (i) MalPaCA successfully identifies capabilities, such as port scans and reuse of Command and Control servers; (ii) It uncovers multiple discrepancies between behavioral clusters and malware family labels; and (iii) It demonstrates the effectiveness of clustering traces using temporal features by producing an error rate of 8.3%, compared to 57.5% obtained from statistical features.

Files

Nadeem2021_Chapter_BeyondLabel... (pdf)
(pdf | 0.844 Mb)
- Embargo expired in 01-06-2021
License info not available