
 
of each population. Then, our system monitored 256 
normal  executable  files  and  122  virus  executable 
files transmitted for testing in test-bed network. As a 
result,  all  executable  files  have  been  extracted 
perfectly. Finally, the byte distribution values of the 
extracted  executable  files  were  compared  with  the 
clustering  central  values  of  each  population.  Here, 
the truncation size of  each region is determined as 
the  size  which  most  well  can  distinguish  between 
normal executable file and malicious executable file 
through learning tests of several times. Basically, the 
size of each region is more than the minimum 100 
bytes for the data confidence. Most of all, we made a 
greater effort for minimizing the false positive rate, 
and maximizing the detection rate. 
Table 1: Experimental results. 
+ A.(All), D.(DOS header), P.(PE header), S.T.(Section Table), 
S.(Sections), C.(Count) 
Our experimental result in this way is shown in 
the  table  1.  In  the  case  of  the  extracted  normal 
executable files, 230 executable files were altogether 
normally determined in each region. In the case of 
the  other  side,  only  8  executable  files  were 
altogether normally determined in each region. That 
is, the normal executable files were normally judged 
with about 90% among 256 normal executable files 
for  testing.  On  the  other  hand,  the  malicious 
executable  files  were  as  detected  as  93%  degree 
among 122 virus executable files for testing. 
5  CONCLUSIONS 
In  this  paper,  we  present  the  network-based 
executable file extraction and analysis technique for 
malware  detection.  The  proposed  technique  can 
detect  not  only  the  known  malicious  software  but 
also unknown malicious  software. Most of all, our 
approach  easily  can  detect  the  malicious  software 
without  the  complicated  command  analysis. 
Therefore, it  can  minimize the  load  on  the  system 
execution.  Besides,  it  can  perform  the  real-time 
malware  detection  as  a  network  inline-mode  by 
using  in  reconfiguring  hardware.  Finally,  we 
reported  the  experimental  results  of  our  approach. 
As shown in  the experimental result, our approach 
showed  a  false  positive  rate  under  10%  and  a 
detection  rate  over  90%  beyond  expectation.  In 
future, we need to focus on reducing its false rate as 
the further study through more experimental results. 
Also, we will keep up our efforts for improvement in 
performance of detection mechanism on real world 
environment. 
REFERENCES 
Liu  Wu,  Ren  Ping,  Liu  Ke,  and  Duan  Hai-xin,  2011, 
‘Behavior-based Malware Analysis and Detection’, In 
Proceedings of the 2011 First International Workshop 
on Complexity and Data Mining, Nanjing, China, pp. 
39–42. 
Brijesh  Kumar  and  Constantine  Katsinis,  2010,  ‘A 
Network  Based  Approach  to  Malware  Detection  in 
Large IT Infrastructures’, In Proceedings of the 2010 
Ninth  IEEE  International  Symposium  on  Network 
Computing and Applications, MA, USA, pp. 188–191. 
Ikkyun  Kim,  Daewon  Kim,  Byoungkoo  Kim,  Yangseo 
Choi, Seoungyong Yoon, Jintae Oh, and Jongsoo Jang, 
2009.  ‘A  case  study  of  unknown  attack  detection 
against zero-day worm in the honeynet environment’, 
In Proceedings of the 11th international conference on 
Advanced Communication Technology, NJ, USA, pp. 
1715–1720. 
Wei-Jen Li, Ke Wang, Salvatore J. Stolfo, and Benjamin 
Herzog, 2005. ‘Fileprints: Identifying File Types by n-
gram  Analysis’,  In  Proceedings  of  the  2005  IEEE 
Workshop  on  Information  Assurance  and  Security, 
West Point, NY, USA, pp. 64–71.  
Ke Wang, Gabriela Cretu, and Salvatore J. Stolfo, 2005. 
‘Anomalous  Payload-based  Worm  Detection  and 
Signature  Generation’,  In  Symposium  on  Recent 
Advances  in Intrusion  Detection, Seattle,  WA,  USA, 
pp. 227–246. 
Stig Andersson, Andrew Clark, and George Mohay, 2004.  
‘Network-Based  Buffer  Overflow  Detection  by 
Exploit  Code  Analysis’,  In  Proceedings  of  the 
AusCERT  Asia  Pacific  Information  Technology 
Security Conference, Gold Coast, Australia, pp. 23–27. 
C. Kr¨ugel, T. Toth, and E. Kirda, 2002. ‘Service Specific 
Anomaly Detection for Network Intrusion Detection’, 
In  Proceedings  of  the  2002  ACM  symposium  on 
Applied computing, NY, USA, pp. 201–208. 
W.  Lee  and  D.  Xiang,  2001.  ‘Information-theoretic 
measures  for  anomaly  detection’,  In  Proceedings  of 
the  2001  IEEE Symposium  on  Security  and  Privacy, 
Washington, DC, USA, pp. 130–143.  
Network-based Executable File Extraction and Analysis for Malware Detection
433