Abstract
In this paper we will demonstrate how systems for malware testing can be designed, implemented and used by master degree students. In this way, we have established two strong platforms for malware testing, while at the same time provided the students with a strong theoretical and practical understanding of how to execute, analyse, and classify malware based on their network and host activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
AAU StudentSpace: Aalborg University Denmark. http://space.aau.dk (2015)
Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C.: Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC’12, pp. 129–138. ACM, New York (2012)
Cuckoo sandbox. http://cuckoosandbox.org (2015)
Gu, G., Perdisci, R., Zhang, J., Lee, W., et al.: Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection. USENIX Secur. Symp. 5, 139–154 (2008)
Hansen, S.S., Larsen, T.M.T., Pirscoveanu, R.S., Czech, A., Stevanovic, M., Pedersen, J.M.: Analysis of malware behavior: systemtype classification using machine learning. In: Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015). IEEE, C-MRiC (2015)
Hogben, G., Plohmann, D., Gerhards-Padilla, E., Leder, F.: Botnets: Detection, measurement, disinfection and defence. In: European Network and Information Security Agency (2011)
Kolmos, A., Krogh, L., Fink, F.K.: The Aalborg PBL model: progress, diversity and challenges. Aalborg University Press, Aalborg (2004)
Net losses: Estimating the global cost of cybercrime. McAfee, Centre for Strategic & International Studies (2014)
Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: A survey. Computer Networks 57(2), 378–403 (2013)
Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet detection based on network behaviour. In: W. Lee, C. Wang, D. Dagon (eds.) Botnet Detection, Advances in Information Security, 36, 1–24. Springer (2008)
Unicorn race engineering: Aalborg university’s formula SAE team http://unicornraceengineering.dk/ (2015)
Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39, 2–16 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Pedersen, J.M., Stevanovic, M. (2016). AAU-Star and AAU Honeyjar: Malware Analysis Platforms Developed by Students. In: ChoraÅ›, R. (eds) Image Processing and Communications Challenges 7. Advances in Intelligent Systems and Computing, vol 389. Springer, Cham. https://doi.org/10.1007/978-3-319-23814-2_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-23814-2_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23813-5
Online ISBN: 978-3-319-23814-2
eBook Packages: EngineeringEngineering (R0)