Skip to main content

AAU-Star and AAU Honeyjar: Malware Analysis Platforms Developed by Students

  • Conference paper
  • First Online:
Image Processing and Communications Challenges 7

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 389))

  • 728 Accesses

Abstract

In this paper we will demonstrate how systems for malware testing can be designed, implemented and used by master degree students. In this way, we have established two strong platforms for malware testing, while at the same time provided the students with a strong theoretical and practical understanding of how to execute, analyse, and classify malware based on their network and host activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. AAU StudentSpace: Aalborg University Denmark. http://space.aau.dk (2015)

  2. Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C.: Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC’12, pp. 129–138. ACM, New York (2012)

    Google Scholar 

  3. Cuckoo sandbox. http://cuckoosandbox.org (2015)

  4. Gu, G., Perdisci, R., Zhang, J., Lee, W., et al.: Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection. USENIX Secur. Symp. 5, 139–154 (2008)

    Google Scholar 

  5. Hansen, S.S., Larsen, T.M.T., Pirscoveanu, R.S., Czech, A., Stevanovic, M., Pedersen, J.M.: Analysis of malware behavior: systemtype classification using machine learning. In: Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015). IEEE, C-MRiC (2015)

    Google Scholar 

  6. Hogben, G., Plohmann, D., Gerhards-Padilla, E., Leder, F.: Botnets: Detection, measurement, disinfection and defence. In: European Network and Information Security Agency (2011)

    Google Scholar 

  7. Kolmos, A., Krogh, L., Fink, F.K.: The Aalborg PBL model: progress, diversity and challenges. Aalborg University Press, Aalborg (2004)

    Google Scholar 

  8. Net losses: Estimating the global cost of cybercrime. McAfee, Centre for Strategic & International Studies (2014)

    Google Scholar 

  9. Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: A survey. Computer Networks 57(2), 378–403 (2013)

    Article  Google Scholar 

  10. Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet detection based on network behaviour. In: W. Lee, C. Wang, D. Dagon (eds.) Botnet Detection, Advances in Information Security, 36, 1–24. Springer (2008)

    Google Scholar 

  11. Unicorn race engineering: Aalborg university’s formula SAE team http://unicornraceengineering.dk/ (2015)

  12. Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39, 2–16 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jens Myrup Pedersen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Pedersen, J.M., Stevanovic, M. (2016). AAU-Star and AAU Honeyjar: Malware Analysis Platforms Developed by Students. In: ChoraÅ›, R. (eds) Image Processing and Communications Challenges 7. Advances in Intelligent Systems and Computing, vol 389. Springer, Cham. https://doi.org/10.1007/978-3-319-23814-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23814-2_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23813-5

  • Online ISBN: 978-3-319-23814-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics