Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Experimental evaluation of malware family classification methods from sequential information of tls-encrypted traffic

Full metadata record
DC Field Value Language
dc.contributor.authorHa, J.-
dc.contributor.authorRoh, H.-
dc.date.accessioned2022-02-15T02:42:21Z-
dc.date.available2022-02-15T02:42:21Z-
dc.date.created2022-02-09-
dc.date.issued2021-12-
dc.identifier.issn2079-9292-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/135813-
dc.description.abstractIn parallel with the rapid adoption of transport layer security (TLS), malware has utilized the encrypted communication channel provided by TLS to hinder detection from network traffic. To this end, recent research efforts are directed toward malware detection and malware family classification for TLS-encrypted traffic. However, amongst their feature sets, the proposals to utilize the sequential information of each TLS session has not been properly evaluated, especially in the context of malware family classification. In this context, we propose a systematic framework to evaluate the state-of-the-art malware family classification methods for TLS-encrypted traffic in a controlled environment and discuss the advantages and limitations of the methods comprehensively. In particular, our experimental results for the 10 representations and classifier combinations show that the graph-based representation for the sequential information achieves better performance regardless of the evaluated classification algorithms. With our framework and findings, researchers can design better machine learning based classifiers. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.titleExperimental evaluation of malware family classification methods from sequential information of tls-encrypted traffic-
dc.typeArticle-
dc.contributor.affiliatedAuthorRoh, H.-
dc.identifier.doi10.3390/electronics10243180-
dc.identifier.scopusid2-s2.0-85121383867-
dc.identifier.wosid000742446500001-
dc.identifier.bibliographicCitationElectronics (Switzerland), v.10, no.24-
dc.relation.isPartOfElectronics (Switzerland)-
dc.citation.titleElectronics (Switzerland)-
dc.citation.volume10-
dc.citation.number24-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordPlusNETWORK-
dc.subject.keywordPlusIDENTIFICATION-
dc.subject.keywordAuthorEncrypted traffic-
dc.subject.keywordAuthorMalware detection-
dc.subject.keywordAuthorMalware family classification-
dc.subject.keywordAuthorTransport layer security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE