Presentation 2014-03-28
Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis
Kensuke NAKATA, Kazunori KAMIYA, Hiroshi KURAKAMI, Kazufumi AOKI, Takeshi YAGI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recent cyber-attacks rapidly get advanced to infect terminals via invalid network access and could damage enterprise activity. Various types of malware and new attack technique are frequently updated so that existing pre-infection countermeasure, such as IDS/IPS or AntiVirus, does not always prevent infection. It becomes important to have post-infection countermeasure, such as infected-host detection or data-loss prevention, to minimize the damage. In this paper, we explain the method of detecting malware-infected hosts : this is based on in-house developed multiple rules which could analyze multi-layered network/security logs that range from Firewall to Proxy. Then we propose the method of tuning rule set considering the deployed network environments, that could select effective rule set by determining fine parameters for selected rules and eliminating ineffective rules.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) log analysis / network log / anomaly detection
Paper # ICSS2013-74
Date of Issue

Conference Information
Committee ICSS
Conference Date 2014/3/20(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis
Sub Title (in English)
Keyword(1) log analysis
Keyword(2) network log
Keyword(3) anomaly detection
1st Author's Name Kensuke NAKATA
1st Author's Affiliation NTT Secure Platform Laboratories, NTT Corporation()
2nd Author's Name Kazunori KAMIYA
2nd Author's Affiliation NTT Secure Platform Laboratories, NTT Corporation
3rd Author's Name Hiroshi KURAKAMI
3rd Author's Affiliation NTT Secure Platform Laboratories, NTT Corporation
4th Author's Name Kazufumi AOKI
4th Author's Affiliation NTT Secure Platform Laboratories, NTT Corporation
5th Author's Name Takeshi YAGI
5th Author's Affiliation NTT Secure Platform Laboratories, NTT Corporation
Date 2014-03-28
Paper # ICSS2013-74
Volume (vol) vol.113
Number (no) 502
Page pp.pp.-
#Pages 6
Date of Issue