By Topic

Navigating and visualizing the malware intelligence space

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Massicotte, F. ; Canadian Cyber Incident Response Centre (CCIRC), Canada ; Couture, M. ; Normandin, H. ; Letourneau, M.

There is now a shift from traditional Cyber Security to Cyber Intelligence. We are only beginning to leverage the intelligence that can be extracted from the thousands of malware samples that are currently being gathered on a daily basis. By automatically creating analysis reports for each of these malware samples, it is possible to improve our understanding of the current cyber security situation on the Internet and of how malware evolves over time. However, research is still required in order to extract, summarize, and present this information to leverage its full potential. In this article, we present two approaches to navigate and visualize what we call the Malware Intelligence Space (i.e., the documentation of millions of malware samples). The first approach, called BeAVER, was built to navigate the Malware Intelligence Space. The second approach, called Malware Threat Radar, was designed to visualize relationships between malware samples and their evolution over time. We also present the technological detail of our implementation prototypes.

Published in:

Network, IEEE  (Volume:26 ,  Issue: 6 )