Skip to main navigation Skip to search Skip to main content

Automated classification of C&C connections through malware URL clustering

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present WebVisor, an automated tool to derive patterns from malware Command and Control (C&C) server connections. From collective network communications stored on a large-scale malware dataset, WebVisor establishes the underlying patterns among samples of the same malware families (e.g., families in terms of development tools). WebVisor focuses on C&C channels based on the Hypertext Transfer Protocol (HTTP). First, it builds clusters based on the statistical features of the HTTP-based Uniform Resource Locators (URLs) stored in the malware dataset. Then, it conducts a fine-grained, noise-agnostic clustering process, based on the structure and semantic features of the URLs. We present experimental results using a software prototype of WebVisor and real-world malware datasets.

Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Proceedings
EditorsDieter Gollmann, Hannes Federrath
PublisherSpringer New York LLC
Pages252-266
Number of pages15
ISBN (Print)9783319184661
DOIs
Publication statusPublished - 1 Jan 2015
Externally publishedYes
Event30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015 - Hamburg, Germany
Duration: 26 May 201528 May 2015

Publication series

NameIFIP Advances in Information and Communication Technology
Volume455
ISSN (Print)1868-4238

Conference

Conference30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015
Country/TerritoryGermany
CityHamburg
Period26/05/1528/05/15

Fingerprint

Dive into the research topics of 'Automated classification of C&C connections through malware URL clustering'. Together they form a unique fingerprint.

Cite this