Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces

Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces

Wednesday, April 28, 2010
Roberto Perdisci, Wenke Lee and Nick Feamster
7th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’10)

We present a novel network-level behavioral malware clustering system. We focus on analyzing the structural similarities among malicious HTTP traffic traces generated by executing HTTP-based malware. Our work is motivated by the need to provide quality input to algorithms that automatically generate network signatures. Accordingly, we define similarity metrics among HTTP traces and develop our system so that the resulting clusters can yield high-quality malware signatures.

We implemented a proof-of-concept version of our network-level malware clustering system and performed experiments with more than 25,000 distinct malware samples. Results from our evaluation, which includes real-world deployment, confirm the effectiveness of the proposed clustering system and show that our approach can aid the process of automatically extracting network signatures for detecting HTTP traffic generated by malware-compromised machines.