(A) comprehensive study on the active malware distribution: common patterns and countermeasures활동중인 악성코드 배포에 대한 종합적인 분석

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 325
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorShin, Seungwon-
dc.contributor.advisor신승원-
dc.contributor.authorCho, Seonghwan-
dc.date.accessioned2022-04-27T19:32:25Z-
dc.date.available2022-04-27T19:32:25Z-
dc.date.issued2021-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=948631&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/296197-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2021.2,[iii, 30 p. :]-
dc.description.abstractSince its inception in the 1980s, malware has continuously evolved in order to infect a greater number of victims and earn more revenue. And recent malware often contains diverse strategies and sophisticated functionalities, targeting almost all business areas. To catch up with these up-to-date malware threats, we need a comprehensive study on the currently active malware dataset, excluding the deprecated malware samples from previous attacks. To this end, we utilize Cyber Threat Intelligence sharing platforms to collect malicious/suspicious malware distribution URLs. Based on the real-time malware intelligence, we collected a large-scale live malware dataset downloaded directly from the web for more than 270 days. In this work, we systematically analyze malware distribution networks' behaviors and characteristics and finally comprehend how we can effectively prevent/hinder malware distributions. The result of our large-scale study shows a clear trend in the current malware landscape. (i) we found that most malware is not newly invented and produced by modifying some existing malware. (ii) we identified four popular malware families, which consist of 43\% of malicious samples. (iii) we identified the server-side malware variant generation patterns through the byte-level similarity result. We also suggest a novel clustering approach to group similar malware variants, reducing future malware analysis burden.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectCyber threat intelligence▼amalware analysis▼alocality sensitive hash▼amalware clustering▼amalware trend study-
dc.subject사이버 위협 인텔리전스▼a악성코드 분석▼a유사도 해시▼a악성코드 군집화▼a악성코드 트렌드 분석-
dc.title(A) comprehensive study on the active malware distribution: common patterns and countermeasures-
dc.title.alternative활동중인 악성코드 배포에 대한 종합적인 분석-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
dc.contributor.alternativeauthor조성환-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0