Exploiting Latent Attack Semantics for Intelligent Malware Detection

نویسندگان

  • Mikhail Kazdagli
  • Constantine Caramanis
  • Sanjay Shakkottai
  • Mohit Tiwari
چکیده

We introduce a newmalware detector – Shape-GD – that aggregates per-machine detectors into a robust global detector. Shape-GD is based on two insights: 1. Structural: actions such as visiting a website (waterhole attack) or membership in a shared email thread (phishing attack) by nodes correlate well with malware spread, and create dynamic neighborhoods of nodes that were exposed to the same attack vector. However, neighborhoods vary unpredictably and require aggregating an unpredictable number of local detectors’ outputs into a global alert. 2. Statistical: feature vectors corresponding to true and false positives of local detectors have markedly different conditional distributions – i.e. their shapes differ. We show that the shape of neighborhoods can identify infected neighborhoods without having to estimate the number of local detectors in the neighborhood. We evaluate Shape-GD by emulating a large community of Windows systems – using system call traces from a few thousand malware and benign applications – and simulating a waterhole attack through a popular website and a phishing attack in a corporate email network. In both these scenarios, we show that Shape-GD detects malware early (∼100 infected nodes in a ∼100K node system for waterhole and ∼10 of 1000 for phishing) and robust (with ∼100% global true positive and ∼1% global false positive rates). At such early stages of infection, existing algorithms that cluster feature vectors are ineffective (have an AUC metric of close to 0.5), and others that count the fraction of alert-generating local detectors require (the weakly correlated) neighborhoods’ sizes to be estimated to within 1% accuracy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several...

متن کامل

IoT Security Techniques Based on Machine Learning

Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...

متن کامل

An intelligent approach for malware detection in dual stack IPv4/IPV6 networks

The advent of internet protocol version 6 (IPv6) as a replacement of internet protocol version 4 (ipv4) has raised the necessity for efficient and effective malware detection techniques for IPv6 networks. Because of the evolvable and polymorphic malware, current malware detection technologies cannot cope with the exponential growth of malwares. This paper proposes a new intelligent approach bas...

متن کامل

PROCEEDINGS OF THE 2 nd INTERNATIONAL CYBER RESILIENCE CONFERENCE 2011 ICR 2011 1 & 2 August , 2011 The Duxton Hotel Perth , Western Australia

This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures that will avoid detection by AV software and hinder analysis. The botnet can then use the customized malware to target an organization with an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1708.01864  شماره 

صفحات  -

تاریخ انتشار 2017