Debugging and Monitoring Malware Network Activities with Haka Ancel & Talbi
نویسندگان
چکیده
Malware analysts have an arsenal of tools with which to reverse engineer malware but lack the means to monitor, debug and control malicious network traffi c. In this paper we propose the use of Haka, an open source security-oriented language, to address this problem. The rationale for this is fourfold: fi rst, Haka features a grammar that allows one to naturally express malware protocol dissectors. Second, Haka provides the most advanced API for packet and stream manipulation. One can drop, create and inject packets. Haka also supports on-the-fl y packet modifi cation. For example, this enables us to hijack some botnet commands to automatically disinfect a set of compromised computers if the malware supports such C&C commands (e.g. uninstall). Third, Haka has an interactive mode that enables it to break into particular packets/streams and inspect their content. Finally, Haka provides a dedicated and customizable tool (Hakabana) to provide a real-time visualization of malware network activities through Kibana dashboards. In this paper we will a provide a set of protocol dissectors and security rules in order to monitor the C&C activities of well-known malware families and show some statistics and interesting results from our tracking of real-word C&C traffi c.
منابع مشابه
Reverse Engineering
This paper provides the basic information about Reverse Software Engineering and its advantages and disadvantages of Reverse Engineering. Today Reverse Engineering is used in many fields of Information Technology in form of Legacy compatibility, Malware Analysis, Network Analysis, Binary code patching, debugging, and improvising existing algorithms, rapid prototyping and even software reusabili...
متن کاملAn automated approach to analysis and classification of Crypto-ransomwares’ family
There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...
متن کاملIncremental Monitoring on Programmable Network Interface Cards
Monitoring of program behavior is a basic necessity for performance tuning and debugging. A major problem is the overhead associated with the monitoring tasks, which influences the program’s behavior and affects the observation results. At the same time, a certain amount of data is needed for the program analysis activities. For this reason, monitoring approaches have to balance the amount of o...
متن کاملMalware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may ta...
متن کاملMalware Detection from a Virtual Machine Correlating Unusual Keystrokes, Network Traffic, and Suspicious Registry Access
Current anti-virus malware detection methods focus on signature-based methods. Recent research has introduced new, effective methods of malware detection. First, recent research including cloud-based monitoring and analysis, joint network-host based methods, feature ranking, machine learning and kernel data structure invariant monitoring are reviewed. Second, virtual machine based malware detec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016