Skip to main content

Massive Data Mining for Polymorphic Code Detection

  • Conference paper
Computer Network Security (MMM-ACNS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3685))

Abstract

Driven by the permanent search for reliable anomaly-based intrusion detection mechanisms, we investigated different statistical methodologies to deal with the detection of polymorphic shellcode. The paper intends to give an overview on existing approaches in the literature as well as a synopsis of our efforts to evaluate the applicability of data mining techniques such as Neural Networks, Self Organizing Maps, Markov Models or Genetic Algorithms in the area of polymorphic code detection. We will then present our achieved results and conclusions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AlephOne: Smashing the stack for fun and profit. Phrack Magazine 49(14) (1996)

    Google Scholar 

  2. Biles, S.: Detecting the Unknown with Snort and the Statistical Packet Anomaly Detection Engine (SPADE). retrieved on (2005), http://www.computersecurityonline.com/spade/SPADE.pdf

  3. Bishop, C.M.: Neural networks for pattern recognition. The Clarendon Press Oxford University Press, New York (1995) With a foreword by Geoffrey Hinton

    Google Scholar 

  4. CLET team: Polymorphic shellcode engine. Phrack Magazine 61(9) (2003)

    Google Scholar 

  5. Duda, R., Hart, P., Stork, D.: Pattern classification, 2nd edn. Wiley-Interscience, New York (2001)

    MATH  Google Scholar 

  6. Helsinki University of Technology. Som toolbox for matlab (2005), http://www.cis.hut.fi/projects/somtoolbox/

  7. K2. Admutate 0.8.4. (2004), Retrieved http://www.ktwo.ca

  8. Kohonen, T.: Self-Organizing Maps. Springer, Heidelberg (2001)

    MATH  Google Scholar 

  9. Kraxberger, S., Payer, U.: Markov Model for Polymorphic Shellcode Detection. In: INC 2005 (2005) (accepted)

    Google Scholar 

  10. Mathworks. Neural network toolbox (2004), http://www.mathworks.com/products/neuralnet/

  11. NASM SourceForge Project (2005), http://nasm.sourceforge.net

  12. Pasupulati, A.C., Levitt, J., Wu, K., Li, S.F., Kuo, S.H., Fan, J.C.: Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. In: Network Operations and Management Symposium, NOMS 2004. IEEE/IFIP, vol. 1, pp. 235–248 (2004)

    Google Scholar 

  13. Payer, U., Teufl, P., Lamberger, M.: Hybrid Engine for Polymorphic Shellcode Detection. In: accepted at DIMVA (2005)

    Google Scholar 

  14. Payer, U., Teufl, P., Lamberger, M.: Traffic classification using Self-Organizing Maps. In: accepted at INC 2005 (2005)

    Google Scholar 

  15. Roweis, S.: Levenberg-marquardt optimization (2005), http://www.cs.toronto.edu/~roweis/notes/lm.pdf

  16. Ruiu, D.: Snort preprocessor - Multi-architecture mutated NOP sled detector (2005), http://cansecwest.com/spp_fnord.c

  17. Sedalo, M.: Polymorphic Shellcode Engine (2004), http://www.shellcode.com.ar

  18. Snort. Open Source Network Intrusion Detection System (2005), http://www.snort.org

  19. Toth, T., Kruegel, C.: Accurate buffer overflow detection via abstract payload execution. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 274–291. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  20. Weisstein, E.W.: Markov Chain. From MathWorld–A Wolfram Web Resource, http://mathworld.wolfram.com/MarkovChain.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Payer, U., Teufl, P., Kraxberger, S., Lamberger, M. (2005). Massive Data Mining for Polymorphic Code Detection. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_38

Download citation

  • DOI: https://doi.org/10.1007/11560326_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29113-8

  • Online ISBN: 978-3-540-31998-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics