Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

Published: 01 February 2018 Publication History

Abstract

In order to fulfill the requirements like stringent timing restraints and demand on resources, CyberPhysical System (CPS) must deploy on the virtualized environment such as cloud computing. To protect Virtual Machines (VMs) in which CPSs are functioning against malware-based attacks, malware detection and mitigation technique is emerging as a highly crucial concern. The traditional VM-based anti-malware software themselves a potential target for malware-based attack since they are easily subverted by sophisticated malware. Thus, a reliable and robust malware monitoring and detection systems are needed to detect and mitigate rapidly the malware based cyber-attacks in real time particularly for virtualized environment. The Virtual Machine Introspection (VMI) has emerged as a fine-grained out-of-VM security solution to detect malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS) by functioning at the Virtual Machine Monitor (VMM) or hypervisor. However, the reconstructed semantic details by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, extensive manual analysis is required by the existing out-of-VM security solutions. To address the foremost issue, in this paper, we propose an advanced VMM-based guest-assisted Automated Multilevel Malware Detection System (AMMDS) that leverages both VMI and Memory Forensic Analysis (MFA) techniques to predict early symptoms of malware execution by detecting stealthy hidden processes on a live guest OS. More specifically, the AMMDS system detects and classifies the actual running malicious executables from the semantically reconstructed process view of the guest OS. The two sub-components of the AMMDS are: Online Malware Detector (OMD) and Offline Malware Classifier (OFMC). The OMD recognizes whether the running processes are benign or malicious using its Local Malware Signature Database (LMSD) and online malware scanner and the OFMC classify unknown malware by adopting machine learning techniques at the hypervisor. The AMMDS has been evaluated by executing large real-world malware and benign executables on to the live guest OSs. The evaluation results achieved 100% of accuracy and zero False Positive Rate (FPR) on the 10-fold cross-validation in classifying unknown malware with maximum performance overhead of 5.8%.

References

[1]
Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, C. Lu, A cloud computing based network monitoring and threat detection system for critical infrastructures, Big Data Res., 3 (2016) 10-23.
[2]
J. Ma, K.-K.R. Choo, H.-h. Hsu, Q. Jin, W. Liu, K. Wang, Y. Wang, X. Zhou, Perspectives on cyber science and technology for cyberization and cyber-enabled worlds, in: Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2016 IEEE 14th Intl C, IEEE, 2016, pp. 1-9.
[3]
R. Chari, F. Ellouze, A. Kouba, B. Qureshi, N. Pereira, H. Youssef, E. Tovar, Cyber-physical systems clouds: a survey, Comput. Netw., 108 (2016) 260-278.
[4]
A.B. Nagarajan, F. Mueller, C. Engelmann, S.L. Scott, Proactive fault tolerance for HPC with Xen virtualization, in: Proceedings of the 21st Annual International Conference on Supercomputing, ACM, 2007, pp. 23-32.
[5]
B. Jablkowski, O. Spinczyk, CPS-Xen: A virtual execution environment for cyber-physical applications, in: International Conference on Architecture of Computing Systems, Springer, 2015, pp. 108-119.
[6]
B. Jablkowski, U.T. Gabor, O. Spinczyk, Evolutionary planning of virtualized cyber-physical compute and control clusters, J. Syst. Archit., 73 (2017) 17-27.
[7]
Y.B. Reddy, Security and design challenges in cyber-physical systems, in: Information Technology-New Generations, ITNG, 2015, 12th International Conference on, IEEE, 2015, pp. 200-205.
[8]
R. Moskovitch, Y. Elovici, L. Rokach, Detection of unknown computer worms based on behavioral classification of the host, Comput. Stat. Data Anal., 52 (2008) 4544-4566.
[9]
D. Lin, M. Stamp, Hunting for undetectable metamorphic viruses, J. Comput. Virol., 7 (2011) 201-214.
[10]
Goudey, Threat report: rootkits, https://www.microsoft.com/en-in/download/details.aspx?id=34797, 2012.
[11]
M. Pearce, S. Zeadally, R. Hunt, Virtualization: issues, security threats, and solutions, ACM Comput. Surv. (CSUR), 45 (2013) 17.
[12]
T. Garfinkel, M. Rosenblum, A virtual machine introspection based architecture for intrusion detection, in: NDSS, vol. 3, 2003, pp. 191-206.
[13]
B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, W. Lee, Virtuoso: narrowing the semantic gap in virtual machine introspection, in: 2011 IEEE Symposium on Security and Privacy, IEEE, 2011, pp. 297-312.
[14]
B. Jain, M.B. Baig, D. Zhang, D.E. Porter, R. Sion, Sok: introspections on trust and the semantic gap, in: 2014 IEEE Symposium on Security and Privacy, IEEE, 2014, pp. 605-620.
[15]
Y. Fu, Z. Lin, Bridging the semantic gap in virtual machine introspection via online kernel data redirection, ACM Trans. Inform. Syst. Sec. (TISSEC), 16 (2013) 7.
[16]
A. Saberi, Y. Fu, Z. Lin, HYBRID-BRIDGE: Efficiently bridging the semantic gap in virtual machine introspection via decoupled execution and training memoization, in: Proceedings of the 21st Annual Network and Distributed System Security Symposium, NDSS14, 2014.
[17]
M. Garnaeva, Kelihos/Hlux botnet returns with new techniques, Securelist, http://www.Securelist.Com/En/Blog/655/Kelihos_Hlux_botnet_Returns_with_new_techniques, 2012.
[18]
M. Sharif, A. Lanzi, J. Giffin, W. Lee, Automatic reverse engineering of malware emulators, in: Security and Privacy, 2009, 30th IEEE Symposium on, IEEE, 2009, pp. 94-109.
[19]
U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, C. Kruegel, A view on current malware behaviors, in: LEET, 2009.
[20]
X. Jiang, X. Wang, D. Xu, Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, 2007, pp. 128-138.
[21]
A. Dinaburg, P. Royal, M. Sharif, W. Lee, Ether: malware analysis via hardware virtualization extensions, in: Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM, 2008, pp. 51-62.
[22]
D. Srinivasan, Z. Wang, X. Jiang, D. Xu, Process out-grafting: an efficient out-of-vm approach for fine-grained process execution monitoring, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, ACM, 2011, pp. 363-374.
[23]
J. Rhee, R. Riley, D. Xu, X. Jiang, Defeating dynamic data kernel rootkit attacks via vmm-based guest-transparent monitoring, in: Availability, Reliability and Security, 2009, ARES09. International Conference on, IEEE, 2009, pp. 74-81.
[24]
S.T. Jones, A.C. Arpaci-Dusseau, R.H. Arpaci-Dusseau, Antfarm: tracking processes in a virtual machine environment, in: USENIX Annual Technical Conference, General Track, 2006, pp. 1-14.
[25]
S.T. Jones, A.C. Arpaci-Dusseau, R.H. Arpaci-Dusseau, VMM-based hidden process detection and identification using lycosid, in: Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, ACM, 2008, pp. 91-100.
[26]
Y.-M. Wang, D. Beck, B. Vo, R. Roussev, C. Verbowski, Detecting stealth software with strider ghostbuster, in: 2005 International Conference on Dependable Systems and Networks, DSN05, IEEE, 2005, pp. 368-377.
[27]
A. Shevchenko, The evolution of self-defense technologies in malware, Available from Webpage: http://www.Viruslist.Com/Analysis, 2007.
[28]
M. Saleh, E.P. Ratazzi, S. Xu, Instructions-Based detection of sophisticated obfuscation and packing, in: 2014 IEEE Military Communications Conference, IEEE, 2014, pp. 1-6.
[29]
B.D. Payne, M. DeCarbone, W. Lee, Secure and flexible monitoring of virtual machines, in: Computer Security Applications Conference, ACSAC 2007, Twenty-Third Annual, IEEE, 2007, pp. 385-397.
[30]
L. Litty, H.A. Lagar-Cavilla, D. Lie, Hypervisor support for identifying covertly executing binaries, in: USENIX Security Symposium, 2008, pp. 243258.
[31]
Z. Gu, Z. Deng, D. Xu, X. Jiang, Process implanting: a new active introspection framework for virtualization, in: Reliable Distributed Systems, SRDS, 2011, 30th IEEE Symposium on, IEEE, 2011, pp. 147-156.
[32]
Y. Fu, J. Zeng, Z. Lin, HYPERSHELL: a practical hypervisor layer guest OS shell for automated in-VM management, in: 2014 USENIX Annual Technical Conference, USENIX ATC 14, 2014, pp. 8596.
[33]
B.D. Payne, M. Carbone, M. Sharif, W. Lee, Lares: an architecture for secure active monitoring using virtualization, in: 2008 IEEE Symposium on Security and Privacy, Sp 2008, IEEE, 2008, pp. 233-247.
[34]
M. Carbone, M. Conover, B. Montague, W. Lee, Secure and robust monitoring of virtual machines through guest-assisted introspection, in: International Workshop on Recent Advances in Intrusion Detection, Springer, 2012, pp. 22-41.
[35]
B. Hay, K. Nance, Forensics examination of volatile system data using virtual introspection, Oper. Syst. Rev., 42 (2008) 74-82.
[36]
A. Case, L. Marziale, G.G. Richard, Dynamic recreation of kernel data structures for live forensics, Digital Invest., 7 (2010) S32-S40.
[37]
R. Poisel, E. Malzer, S. Tjoa, Evidence and cloud computing: the virtual machine introspection approach, JoWUA, 4 (2013) 135-152.
[38]
B. Dolan-Gavitt, B. Payne, W. Lee, Leveraging forensic tools for virtual machine introspection, 2011.
[39]
B. Schatz, Bodysnatcher: Towards reliable volatile memory acquisition by software, Digital Invest., 4 (2007) 126-134.
[40]
J. Stttgen, M. Cohen, Anti-forensic resilient memory acquisition, Digital Invest., 10 (2013) S105-S115.
[41]
M. Yu, Q. Lin, B. Li, Z. Qi, H. Guan, Vis: virtualization enhanced live acquisition for native system, in: Proceedings of the Second Asia-Pacific Workshop on Systems, ACM, 2011, pp. 13.
[42]
X. Zhong, C. Xiang, M. Yu, Z. Qi, H. Guan, A virtualization based monitoring system for mini-intrusive live forensics, Int. J. Parallel Program., 43 (2015) 455-471.
[43]
L. Martignoni, A. Fattori, R. Paleari, L. Cavallaro, Live and trustworthy forensic analysis of commodity production systems, in: International Workshop on Recent Advances in Intrusion Detection, Springer, 2010, pp. 297-316.
[44]
Y. Cheng, X. Fu, X. Du, B. Luo, M. Guizani, A lightweight live memory forensic approach based on hardware virtualization, Inform. Sci. (2016).
[45]
M.G. Schultz, E. Eskin, F. Zadok, S.J. Stolfo, Data mining methods for detection of new malicious executables, in: Security and Privacy, S&P 2001. Proceedings, 2001 IEEE Symposium on, IEEE, 2001, pp. 38-49.
[46]
M.Z. Shafiq, S.M. Tabish, F. Mirza, M. Farooq, Pe-miner: mining structural information to detect malicious executables in realtime, in: International Workshop on Recent Advances in Intrusion Detection, Springer, 2009, pp. 121-141.
[47]
A. Hellal, L.B. Romdhane, Minimal contrast frequent pattern mining for malware detection, Comput. Secur., 62 (2016) 19-32.
[48]
M. Ahmadi, D. Ulyanov, S. Semenov, M. Trofimov, G. Giacinto, Novel feature extraction, selection and fusion for effective malware family classification, in: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, ACM, 2016, pp. 183-194.
[49]
J.Z. Kolter, M.A. Maloof, Learning to detect and classify malicious executables in the wild, J. Mach. Learn. Res., 7 (2006) 2721-2744.
[50]
M.M. Masud, L. Khan, B. Thuraisingham, A scalable multi-level feature extraction technique to detect malicious executables, Inform. Syst. Front., 10 (2008) 33-45.
[51]
N. Nissim, R. Moskovitch, L. Rokach, Y. Elovici, Detecting unknown computer worm activity via support vector machines and active learning, Patt. Anal. Appl., 15 (2012) 459-475.
[52]
I. Santos, F. Brezo, X. Ugarte-Pedrero, P.G. Bringas, Opcode sequences as representation of executables for data-mining-based unknown malware detection, Inform. Sci., 231 (2013) 64-82.
[53]
A. Shabtai, R. Moskovitch, C. Feher, S. Dolev, Y. Elovici, Detecting unknown malicious code by applying classification techniques on opcode patterns, Security Inform., 1 (2012) 1.
[54]
J. Bai, J. Wang, Improving malware detection using multi-view ensemble learning, Security Commun. Netw., 9 (2016) 4227-4241.
[55]
A. Moser, C. Kruegel, E. Kirda, Limits of static analysis for malware detection, in: Computer Security Applications Conference, ACSAC 2007, Twenty-Third Annual, IEEE, 2007, pp. 421-430.
[56]
Z. Shan, X. Wang, Growing grapes in your computer to defend against malware, IEEE Trans. Inform. Foren. Secur., 9 (2014) 196-207.
[57]
C. Willems, T. Holz, F. Freiling, Toward automated dynamic malware analysis using cwsandbox, IEEE Secur. Priv., 5 (2007).
[58]
K. Rieck, P. Trinius, C. Willems, T. Holz, Automatic analysis of malware behavior using machine learning, J. Comput. Secur., 19 (2011) 639-668.
[59]
E. Menahem, A. Shabtai, L. Rokach, Y. Elovici, Improving malware detection by applying multi-inducer ensemble, Comput. Statist. Data Anal., 53 (2009) 1483-1494.
[60]
F. Shahzad, M. Shahzad, M. Farooq, In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS, Inform. Sci., 231 (2013) 45-63.
[61]
Q. Miao, J. Liu, Y. Cao, J. Song, Malware detection using bilayer behavior abstraction and improved one-class support vector machines, Internat. J. Inform. Secur., 15 (2016) 361-379.
[62]
R. Islam, R. Tian, L.M. Batten, S. Versteeg, Classification of malware based on integrated static and dynamic features, J. Netw. Comput. Appl., 36 (2013) 646-656.
[63]
A. Kumar, K. Kuppusamy, G. Aghila, A learning model to detect maliciousness of portable executable using integrated feature set, J. King Saud University-Computer and Information Sciences (2017).
[64]
S. Huda, S. Miah, M.M. Hassan, R. Islam, J. Yearwood, M. Alrubaian, A. Almogren, Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data, Inform. Sci., 379 (2017) 211-228.
[65]
M.R. Watson, A.K. Marnerides, A. Mauthe, D. Hutchison, Malware detection in cloud computing infrastructures, IEEE Trans. Dependable Secure Comput., 13 (2016) 192-205.
[66]
T.K. Lengyel, S. Maresca, B.D. Payne, G.D. Webster, S. Vogl, A. Kiayias, Scalability, fidelity and stealth in the drakvuf dynamic malware analysis system, in: Proceedings of the 30th Annual Computer Security Applications Conference, ACM, 2014, pp. 386-395.
[67]
Y. Zhang, Q. Huang, X. Ma, Z. Yang, J. Jiang, Using multi-features and ensemble learning method for imbalanced malware classification, in: Trustcom/BigDataSE/ISPA, 2016 IEEE, IEEE, 2016, pp. 965-973.
[68]
Intel, Intel trusted exceution technology, Accessed on September 2016, http://www.intel.com/technology/security/, 2016.
[69]
R. Wojtczuk, J. Rutkowska, Attacking intel trusted execution technology, Black Hat DC, 2009.
[70]
R. Wojtczuk, Subverting the xen hypervisor, Black Hat USA, 2008.
[71]
M.E. Russinovich, D.A. Solomon, A. Ionescu, Windows internals, Pearson Education, 2012.
[72]
J. Lamps, I. Palmer, R. Sprabery, WinWizard: expanding xen with a LibVMI intrusion detection tool, in: Cloud Computing (CLOUD), 2014 IEEE 7th International Conference on, IEEE, 2014, pp. 849-856.
[73]
M. Pietrek, Peering inside the pe: a tour of the win32 (r) portable executable file format, Microsoft Syst. J.-US Edition (1994) 15-38.
[74]
M.H. Ligh, A. Case, J. Levy, A. Walters, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, John Wiley & Sons, 2014.
[75]
D.K.S. Reddy, A.K. Pujari, N-gram analysis for computer virus detection, J. Comput. Virol., 2 (2006) 231-239.
[76]
K. Dave, Study of feature selection algorithms for text-categorization, 2011.
[77]
D. Mladenic, M. Grobelnik, Feature selection for unbalanced class distribution and naive bayes, in: ICML, vol. 99, 1999, pp. 258-267.
[78]
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, I.H. Witten, The weka data mining software: an update, ACM SIGKDD Explor. Newslet., 11 (2009) 10-18.
[79]
M.I. Sharif, W. Lee, W. Cui, A. Lanzi, Secure in-vm monitoring using hardware virtualization, in: Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, 2009, pp. 477-487.
[80]
M. Valipour, Optimization of neural networks for precipitation analysis in a humid region to detect drought and wet year alarms, Meteorol. Appl., 23 (2016) 91-100.
[81]
T.M. Oshiro, P.S. Perez, J.A. Baranauskas, How many trees in a random forest?, in: International Workshop on Machine Learning and Data Mining in Pattern Recognition, Springer, 2012, pp. 154-168.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Future Generation Computer Systems
Future Generation Computer Systems  Volume 79, Issue P1
February 2018
265 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 February 2018

Author Tags

  1. CyberPhysical system
  2. Feature selection technique
  3. Hypervisor
  4. Machine learning
  5. Memory forensic analysis
  6. N-gram feature extraction
  7. Virtual machine introspection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Feed-Forward Deep Neural Network (FFDNN)-Based Deep Features for Static Malware DetectionInternational Journal of Intelligent Systems10.1155/2023/95444812023Online publication date: 1-Jan-2023
  • (2023)Evaluating virtualization for fog monitoring of real-time applications in mixed-criticality systemsReal-Time Systems10.1007/s11241-023-09410-459:4(534-567)Online publication date: 1-Nov-2023
  • (2022)MSAAMSecurity and Communication Networks10.1155/2022/22069172022Online publication date: 1-Jan-2022
  • (2021)Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at HypervisorMobile Networks and Applications10.1007/s11036-019-01503-426:4(1668-1685)Online publication date: 1-Aug-2021

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media