Share Email Print
cover

Proceedings Paper

Behavioral analysis of malicious code through network traffic and system call monitoring
Author(s): André R. A. Grégio; Dario S. Fernandes Filho; Vitor M. Afonso; Rafael D. C. Santos; Mario Jino; Paulo L. de Geus
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.

Paper Details

Date Published: 19 May 2011
PDF: 10 pages
Proc. SPIE 8059, Evolutionary and Bio-Inspired Computation: Theory and Applications V, 80590O (19 May 2011); doi: 10.1117/12.883457
Show Author Affiliations
André R. A. Grégio, Ctr. de Tecnologia da Informação Renato Archer (Brazil)
Univ. Estadual de Campinas (Brazil)
Dario S. Fernandes Filho, Ctr. de Tecnologia da Informação Renato Archer (Brazil)
Univ. Estadual de Campinas (Brazil)
Vitor M. Afonso, Ctr. de Tecnologia da Informação Renato Archer (Brazil)
Univ. Estadual de Campinas (Brazil)
Rafael D. C. Santos, Instituto Nacional de Pesquisas Espaciais (Brazil)
Mario Jino, Univ. Estadual de Campinas (Brazil)
Paulo L. de Geus, Univ. Estadual de Campinas (Brazil)


Published in SPIE Proceedings Vol. 8059:
Evolutionary and Bio-Inspired Computation: Theory and Applications V
Misty Blowers; Teresa H. O'Donnell; Olga Lisvet Mendoza-Schrock, Editor(s)

© SPIE. Terms of Use
Back to Top