Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

Ying-Dar Lin, Tzung Bi Shih, Yu-Sung Wu*, Yuan Cheng Lai

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Dynamic analysis is typically performed in a closed network environment to prevent the malware under analysis from attacking machines on the Internet. However, many of today's malwares require Internet connectivity to operate and to be thoroughly analyzed in a closed network environment. We propose a secure and transparent network environment that allows the malware in a dynamic analysis environment to have seemingly unrestricted Internet access in a secure manner. Our environment transparently dispatches malicious network traffic to compatible decoys while allowing harmless control traffic to have Internet access. We use 12 real-world malware samples, which involve Internet connections, to evaluate the effectiveness of the proposed environment. The evaluation shows that the proposed environment can allow malware to exhibit more network activities than a closed network environment and can even outperform the baseline open network environment in some cases. In the meantime, Internet security is maintained by the dispatching of attack and propagation traffic to decoys inside the analysis environment.

Original languageEnglish
Pages (from-to)626-640
Number of pages15
JournalSecurity and Communication Networks
Volume7
Issue number3
DOIs
StatePublished - Mar 2014

Keywords

  • Botnet
  • Dynamic analysis
  • Malware
  • Transparent network

Fingerprint

Dive into the research topics of 'Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment'. Together they form a unique fingerprint.

Cite this