CALL US

+91 9116117170

Malware can be spotted by network traffic | Cyberops

Malware can be Spotted by Network Traffic

By Chandan Singh 0 Comment May 26, 2017

Malware can be spotted by network traffic:-

Learning network traffic going to suspicious domains could demonstrate to security administrators that their network is afflicted with malware – months, before they might get a sample of the forward malware, says a new study out of the Georgia Institute of Technology.

The researchers lurking behind the study claim their findings point to a paradigm shift in the strategies IT admins will have to use in the future to discover network security breaches quicker than they are currently able.

“Our study shows that when you find the malware, it’s already too later because the network communications and domains employed by the malware were active several weeks or even months before the actual malware was discovered, ” said Mano Antonakakis, an assistant tutor in the School of Electrical and Computer Engineering at the Georgia Institute of Technology. “These conclusions show that we need to fundamentally change the way we believe about network defense.

The findings have a look at the way in which malware communicates with their command-and-control centers. This network traffic can then be discovered and analyzed. Thus, admins can get a previously indication of malware and put in place the defenses needed to stop it, at least reduce its impact.

(Cyber Security, Information Security, Cyber Crime Investigation)

While heritage defenses seek to identify malware samples once they have already occupied a network, the time slows between infection and detection offers a benefit to the malware authors – the time they need to release their payloads and accumulate data.

“What we need to do is decrease the amount of time passed between the {bargain|give up|endanger} and the detection event, ” Antonakakis said.

The research was presented on May 24 at the 38th IEEE Security and Privacy Meeting in San Jose, Calif., supported by the U. S. Division of Commerce, the Countrywide Science Foundation, the Surroundings Force Research Laboratory and the Defense Advanced Study Projects Agency.

Source: www.scmagazine.com

error: Content is protected by Cyberops !!