Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1866307.1866353acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

AccessMiner: using system-centric models for malware protection

Published: 04 October 2010 Publication History

Abstract

Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems to detect software exploits. As another example, policies based on system calls are used to sandbox applications or to enforce access control. Given that malware represents a significant security threat for today's computing infrastructure, it is not surprising that system calls were also proposed to distinguish between benign processes and malicious code.
Most proposed malware detectors that use system calls follows program-centric analysis approach. That is, they build models based on specific behaviors of individual applications. Unfortunately, it is not clear how well these models generalize, especially when exposed to a diverse set of previously-unseen, real-world applications that operate on realistic inputs. This is particularly problematic as most previous work has used only a small set of programs to measure their technique's false positive rate. Moreover, these programs were run for a short time, often by the authors themselves.
In this paper, we study the diversity of system calls by performing a large-scale collection (compared to previous efforts) of system calls on hosts that run applications for regular users on actual inputs. Our analysis of the data demonstrates that simple malware detectors, such as those based on system call sequences, face significant challenges in such environments. To address the limitations of program-centric approaches, we propose an alternative detection model that characterizes the general interactions between benign programs and the operating system (OS). More precisely, our system-centric approach models the way in which benign programs access OS resources (such as files and registry entries). Our experiments demonstrate that this approach captures well the behavior of benign programs and raises very few (even zero) false positives while being able to detect a significant fraction of today's malware.

References

[1]
}}Anubis: analyzing unknown binaries. http://anubis.iseclab.org, 2008.
[2]
}}M.Bailey, J.Oberheide, J.Andersen, Z.M. Mao, F.Jahanian, and J.Nazario. Automated classification and analysis of internet malware. In C.Kruegel, R.Lippmann, and A.Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), volume 4637 of Lecture Notes in Computer Science}, pages 178--197, Gold Goast, Australia, Sept. 2007. Springer-Verlag.
[3]
}}U.Bayer, P.M. Comparetti, C.Hlauschek, C.Kruegel, and E.Kirda. Scalable, behavior-based malware clustering. In Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS'09), San Diego, CA, USA, Feb. 2009.
[4]
}}D.Bruschi, L.Martignoni, and M.Monga. Detecting self-mutating malware using control-flow graph matching. In R.Buschkes and P.Laskov, editors, Proceedings of the 3rd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'06), volume 4064 of Lecture Notes in Computer Science, pages 129--143. Springer-Verlag, 2006.
[5]
}}M.Christodorescu, S.Jha, S.A. Seshia, D.Song, and R.E. Bryant. Semantics-aware malware detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S &P'05), pages 32--46, Oakland, CA, USA, May 8--11, 2005. IEEE Computer Society.
[6]
}}M.Christodorescu, C.Kruegel, and S.Jha. Mining specifications of malicious behavior. In Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'07), pages 5--14, New York, NY, USA, 2007. ACM Press.
[7]
}}M.Debbabi, M.Girard, L.Poulin, M.Salois, and N.Tawbi. Dynamic monitoring of malicious activity in software systems. In Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS'01), pages 1--10, Indianapolis, IN, USA, Mar. 2001.
[8]
}}W.Enck, P.D. McDaniel, and T.Jaeger. Pinup: Pinning user files to known applications. In Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC'08), pages 55--64, Anaheim, CA, USA, Dec. 2008. IEEE Computer Society.
[9]
}}S.Forrest, S.A. Hofmeyr, A.Somayaji, and T.A. Longstaff. A sense of self for unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy (S &P'96), pages 120--128. IEEE Computer Society Press, 1996.
[10]
}}G.Hoglund and J.Butler. Rootkits: Subverting the Windows kernel}. Addison-Wesley Professional, 2005.
[11]
}}T.Holz, M.Engelberth, and F.Freiling. Learning more about the Underground Economy: A Case-Study of Keyloggers and Dropzones. In European Symposium on Research in Computer Security (ESORICS), 2009.
[12]
}}J.John, A.Moshchuk, S.Gribble, and A.Krishnamurthy. Studying Spamming Botnets using Botlab. >In Usenix NSDI, 2009.
[13]
}}D.Kang, D.Fuller, and V.Honavar. Learning classifiers for misuse and anomaly detection using a bag on system calls representation. In 6th IEEE Systems Man and Cybernetics Information Assurance Workshop (IAW), 2005.
[14]
}}E.Kirda, C.Kruegel, G.Banks, G.Vigna, and R.Kemmerer. Behavior-based spyware detection. In Proceedings of the 15th USENIX Security Symposium (Security'06), Vancouver, BC, Canada, August 2006.
[15]
}}C.Kolbitsch, P.Milani, C.Kruegel, E.Kirda, X.Zhou, and X.Wang. Effective and efficient malware detection at the end host. In Proceedings of the 18th USENIX Security Symposium (Security'09), pages 351--366, Montreal, Canada, Aug. 2009. USENIX Association.
[16]
}}C.Kruegel, E.Kirda, D.Mutz, W.Robertson, and G.Vigna. Automating mimicry attacks using static binary analysis. In Proceedings of the 14th USENIX Security Symposium (Security'05), Baltimore, MD, USA, August 2005.
[17]
}}C.Kruegel, E.Kirda, D.Mutz, W.Robertson, and G.Vigna. Polymorphic Worm Detection Using Structural Information on Executables. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID'05), volume 3858 of LNCS, pages 207--226, Seattle, WA, September 2005. Springer-Verlag.
[18]
}}T.Lee and J.J. Mody. Behavioral classification. In Proceedings of the 15th Annual European Institute for Computer Antivirus Research Conference (EICAR'06), May 2006.
[19]
}}W.-J. Li, K.Wang, S.J. Stolfo, and B.Herzog. Fileprints: Identifying file types by n-gram analysis. In Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics (SMC) Workshop on Information Assurance, pages 64--71, West Point, NY, June 2005. United States Military Academy.
[20]
}}P.Loscocco and S.Smalley. Integrating flexible support for security policies into the linux operating system. In Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference, pages 29--42, Berkeley, CA, USA, 2001. USENIX Association.
[21]
}}L.Martignoni, E.Stinson, M.Fredrikson, S.Jha, and J.C. Mitchell. A layered architecture for detecting malicious behaviors. In Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection (RAID'08), pages 78--97, Berlin, Heidelberg 2008. Springer-Verlag.
[22]
}}S.Mukkamala, A.Sung, D.Xu, and P.Chavez. Static analyzer for vicious executables (SAVE). In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04), pages 326--334, Tucson, AZ, USA, Dec. 2004.
[23]
}}K.Rieck, T.Holz, C.Willems, P.Dussel1, and P.Laskov. Learning and classification of malware behavior. In D.Zamboni, editor, Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'08), volume 5137 of Lecture Notes in Computer Science}, pages 108--125. Springer-Verlag, 2008.
[24]
}}M.Salois and R.Charpentier. Dynamic detection of malicious code in COTS software. In Proceedings of the Information Systems Technology Panel (IST) Symposium on Commercial Off-the-Shelf Products in Defence Applications "The Ruthless Pursuit of COTS", pages 16--1--16--13, Brussels, Belgium, Apr. 2000. NATO Research and Technology Organization.
[25]
}}M.G. Schultz, E.Eskin, E.Zadok, and S.J. Stolfo. Data mining methods for detection of new malicious executables. In Proceedings of the 2001 IEEE Symposium on Security and Privacy (S &P'01), pages 38--49, May 2001.
[26]
}}E.Stinson and J.C. Mitchell. Characterizing bots' remote control behavior. In C.Kruegel, R.Lippmann, and A.Clark, editors, Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), volume 4637 of Lecture Notes in Computer Science. Springer-Verlag, 2007.
[27]
}}P.Szor. The Art of Computer Virus Research and Defense. Addison-Wesley, 2005.
[28]
}}D.Wagner and P.Soto. Mimicry attacks on host-based intrusion detection systems. In Proceedings of the 9th ACM conference on Computer and Communications Security (CCS'02), pages 255--264, New York, NY, USA, 2002. ACM.
[29]
}}J.Xu, A.H. Sung, P.Chavez, and S.Mukkamala. Polymorphic malicious executable scanner by API sequence analysis. In Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS'04), pages 378--383, Kitakyushu, Japan, Dec. 2004. IEEE Computer Society.
[30]
}}H.Yin, D.Song, M.Egele, C.Kruegel, and E.Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM conference on Computer and Communications Security (CCS'07), pages 116--127, New York, NY, USA, 2007. ACM.

Cited By

View all
  • (2024)Deep Learning for Cyberthreats: Performance Analysis and Application of Malware Classification in Edge Computing2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)10.1109/IITCEE59897.2024.10467665(1-5)Online publication date: 24-Jan-2024
  • (2024)Malware Detection Using Machine Learning Algorithms in AndroidProceedings of the 5th International Conference on Data Science, Machine Learning and Applications; Volume 110.1007/978-981-97-8031-0_60(561-568)Online publication date: 6-Oct-2024
  • (2024)AI-Driven Cyber Risk Management FrameworkInnovations in Smart Cities Applications Volume 710.1007/978-3-031-53824-7_51(571-584)Online publication date: 20-Feb-2024
  • Show More Cited By

Index Terms

  1. AccessMiner: using system-centric models for malware protection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
    October 2010
    782 pages
    ISBN:9781450302456
    DOI:10.1145/1866307
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anomaly-based detector
    2. malware
    3. system call

    Qualifiers

    • Research-article

    Conference

    CCS '10
    Sponsor:

    Acceptance Rates

    CCS '10 Paper Acceptance Rate 55 of 325 submissions, 17%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)31
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 12 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Deep Learning for Cyberthreats: Performance Analysis and Application of Malware Classification in Edge Computing2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)10.1109/IITCEE59897.2024.10467665(1-5)Online publication date: 24-Jan-2024
    • (2024)Malware Detection Using Machine Learning Algorithms in AndroidProceedings of the 5th International Conference on Data Science, Machine Learning and Applications; Volume 110.1007/978-981-97-8031-0_60(561-568)Online publication date: 6-Oct-2024
    • (2024)AI-Driven Cyber Risk Management FrameworkInnovations in Smart Cities Applications Volume 710.1007/978-3-031-53824-7_51(571-584)Online publication date: 20-Feb-2024
    • (2024)Android Malware Detection Using Machine Learning: A ReviewIntelligent Systems and Applications10.1007/978-3-031-47715-7_35(507-522)Online publication date: 30-Jan-2024
    • (2023)Separating Malicious from Benign Software Using Deep Learning AlgorithmElectronics10.3390/electronics1208186112:8(1861)Online publication date: 14-Apr-2023
    • (2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179405(2620-2638)Online publication date: May-2023
    • (2023)By Your Command: Extracting the User Actions that Create Network Flows in Android2023 14th International Conference on Network of the Future (NoF)10.1109/NoF58724.2023.10302820(118-122)Online publication date: 4-Oct-2023
    • (2023)An Ensemble-Based Parallel Deep Learning Classifier With PSO-BP Optimization for Malware DetectionIEEE Access10.1109/ACCESS.2023.329678911(76330-76346)Online publication date: 2023
    • (2023)A novel malware detection method based on API embedding and API parametersThe Journal of Supercomputing10.1007/s11227-023-05556-x80:2(2748-2766)Online publication date: 21-Aug-2023
    • (2022)Scramblesuit: An effective timing side-channels framework for malware sandbox evasion1Journal of Computer Security10.3233/JCS-22000530:6(851-876)Online publication date: 23-Nov-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media