A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware
[chapter]
2014
Lecture Notes in Computer Science
Networked machines serving as binary distribution points, C&C channels, or drop sites are a ubiquitous aspect of malware infrastructure. By sandboxing malcode one can extract the network endpoints (i.e., domains and URL paths) contacted during execution. Some endpoints are benign, e.g., connectivity tests. Exclusively malicious destinations, however, can serve as signatures enabling network alarms. Often these behavioral distinctions are drawn by expert analysts, resulting in considerable cost
doi:10.1007/978-3-319-08509-8_9
fatcat:5ccxoe62ozca7dvbvmqh4n4koa