Publication:
Classification of Exploit-Kit behaviors via machine learning approach

dc.contributor.authorSukritta Harnmettaen_US
dc.contributor.authorSudsanguan Ngamsuriyarojen_US
dc.contributor.otherMahidol Universityen_US
dc.date.accessioned2019-08-23T11:08:06Z
dc.date.available2019-08-23T11:08:06Z
dc.date.issued2018-03-23en_US
dc.description.abstract© 2018 Global IT Research Institute (GiRI). An Exploit-Kit (EK) is the cyber attacking tool which targets in finding vulnerabilities appeared on a web browser instance such as web-plugins, add-on instances usually installed in a web browser. Such instances may send some suitable malware payload through the vulnerabilities they found. This kind of such cyber-attack is known as the drive-by-download attack where malware downloading do not require any interaction from users. In addition, EK can do self-protection by imitating a benign website or responding to end-users with HTTP 404 error code whenever it encountered an unsupported target web browser. As a result, detecting EK requires a lot of effort. However, when an EK launches an attack, there are some patterns of interactions between a host and a victim. In this work, we obtain a set of data from www.malware-traffic-analysis.net and analyze those interactions in order to identify a set of features. We use such features to build a model for classifying interaction patterns of each EK type. Our experiments show that, with 5,743 network flows and 45 features, our model using Decision tree approach can classify EK traffic and EK type with accuracy of 97.74% and 97.11% respectively. In conclusion, our proposed work can help detect the behavior of EK with high accuracy.en_US
dc.identifier.citationInternational Conference on Advanced Communication Technology, ICACT. Vol.2018-February, (2018), 468-473en_US
dc.identifier.doi10.23919/ICACT.2018.8323798en_US
dc.identifier.issn17389445en_US
dc.identifier.other2-s2.0-85046744146en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/20.500.14594/45816
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85046744146&origin=inwarden_US
dc.subjectEngineeringen_US
dc.titleClassification of Exploit-Kit behaviors via machine learning approachen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85046744146&origin=inwarden_US

Files

Collections