stealthML: Data-driven Malware for Stealthy Data Exfiltration

CSR(2023)

引用 0|浏览12
暂无评分
摘要
The use of machine learning methods have been actively studied to detect and mitigate the consequences of malicious attacks. However, this sophisticated technology can become a threat when it falls into the wrong hands. This paper describes a new class of malware that employs machine learning to autonomously infer when and how to trigger an attack payload to maximize impact while minimizing attack traces. We designed, implemented, and demonstrated a smart malware that monitors the real-time network traffic flow of the victim system, analyzes the collected traffic data to forecast traffic and identify the most opportune time to trigger data extraction, and optimizes its strategy in planning the data exfiltration to minimize traces that might reveal the malware's presence.
更多
查看译文
关键词
attack payload,attack traces,collected traffic data,data extraction,data-driven malware,machine learning methods,malicious attacks,realtime network traffic flow,smart malware,sophisticated technology,stealthML,stealthy data exfiltration planning,victim system
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要