• español
    • English
  • Policies
  • English 
    • español
    • English
  • Login
View Item 
  •   Repositorio Institucional ULima
  • Artículos científicos
  • Ingeniería de Sistemas
  • View Item
  •   Repositorio Institucional ULima
  • Artículos científicos
  • Ingeniería de Sistemas
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats

Thumbnail
View/Open
Abstract_References.pdf
(application/pdf: 816.1Kb)
Date
2020
Author(s)
Maestre Vidal, Jorge
Sotelo Monge, Marco Antonio
Martínez Monterrubio, Sergio Mauricio
Metadata
Show full item record
Abstract
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building models of the normal/legitimate activities registered at the protected systems, from them analyzing the incoming observations looking for significant discordances that may reveal misbehaviors. But in the last years, the adversarial machine learning paradigm introduced never-seen-before evasion procedures able to jeopardize the traditional anomaly-based methods, thus entailing one of the major emerging challenges in the cybersecurity landscape. With the aim on contributing to their adaptation against adversarial threats, this paper presents EsPADA (Enhanced Payload Analyzer for malware Detection robust against Adversarial threats), a novel approach built on the grounds of the PAYL sensor family. At the SPARTA Training stage, both normal and adversarial models are constructed according to features extracted by N-gram, which are stored within Counting Bloom Filters (CBF). In this way it is possible to take advantage of both binary-based and spectral-based traffic modeling procedures for malware detection. At Detection stage, the payloads to be analyzed are collected from the protected environment and compared with the usage models previously built at Training. This leads to calculate different scores that allow to discriminate their nature (normal or suspicious) and to assess the labeling coherency, the latest studied for estimating the likelihood of the payload disguising mimicry attacks. The effectiveness of EsPADA was demonstrated on the public datasets DARPA'99 and UCM 2011 by achieving promising preliminarily results.
URI
https://hdl.handle.net/20.500.12724/9671
DOI
https://doi.org/10.1016/j.future.2019.10.022
How to cite
Maestre Vidal, J., Sotelo Monge, M. A., & Martínez Monterrubio, S. (2020). EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats. Future Generation Computer Systems, 104, 159-173. https://doi.org/10.1016/j.future.2019.10.022
Publisher
Elsevier
Area / Line of research
Productividad y empleo / Innovación: tecnologías y productos
Category / Subcategory
Ingeniería de sistemas / Diseño y métodos
Subject
Malware (Programa para computadora)
Seguridad informática
Redes de computadores
Malware (Computer software)
Data protection
Computer networks
Related Resource(s)
https://doi.org/10.1016/j.future.2019.10.022
Journal
Future Generation Computer Systems
Note
Indexado en Scopus
Collections
  • Ingeniería de Sistemas [82]


Contacto: repositorio@ulima.edu.pe

Todos los derechos reservados. Diseñado por Chimera Software
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsAdvisorsAuthors UlimaArea / Line of researchCategory / SubcategoryDocument typeThis CollectionBy Issue DateAuthorsTitlesSubjectsAdvisorsAuthors UlimaArea / Line of researchCategory / SubcategoryDocument type

My Account

LoginRegister

Statistics

View Usage Statistics

Contacto: repositorio@ulima.edu.pe

Todos los derechos reservados. Diseñado por Chimera Software