RBACS: Rootkit Behavioral Analysis and Classification System
|
|
|
- Eric Patterson
- 9 years ago
- Views:
Transcription
1 2010 Third International Conference on Knowledge Discovery and Data Mining RBACS: Rootkit Behavioral Analysis and Classification System Desmond Lobo, Paul Watters and Xinwen Wu Internet Commerce Security Laboratory University of Ballarat Ballarat, Australia {p.watters, Abstract- In this paper, we focus on rootkits, a special type of malicious software (malware) that operates in an obfuscated and stealthy mode to evade detection. Categorizing these rootkits will help in detecting future attacks against the business community. We first developed a theoretical framework for classifying rootkits. Based on our theoretical framework, we then proposed a new rootkit classification system and tested our system on a sample of rootkits that use inline function hooking. Our experimental results showed that our system could successfully categorize the sample using unsupervised clustering. Keywords- rootkits; malware; behavioral analysis; classification; data mining I. INTRODUCTION This paper focuses on rootkits, which refers to software that is used to hide the presence and activity of malware from the system administrator [1]. There has been an increase of several hundred percent in both the number and complexity of rootkits over the last few years [2]. Malicious software is already a very big worldwide problem. The emergence and proliferation of rootkits are only going to serve to escalate this problem. A large percentage of malware attacks target commercial enterprises with the intention of generating large profits for the malware s authors, while the visibility of these threats is on the decline since stealth techniques, such as rootkits, are deployed to hide the malware. This trend is clearly illustrated in figure 1. Categorizing these rootkits, we believe, will help in detecting future attacks against the business community. The contributions of this paper are as follows. To address the limitations of the existing theoretical frameworks for classifying rootkit, we offer a revised framework. Based on this framework, we then propose a new system for categorizing rootkits and demonstrate the effectiveness of this system. The structure of this paper is outlined below: Section II describes some of the previous theoretical studies that have been carried out in the field of computer virology and highlights, in particular, a recent study that was conducted at the Georgia Institute of Technology (Georgia Tech). Visibility and Malicious Intent worms fame and glory Time Visibility Malicious Intent rootkits highly profitable cybercrime Figure 1. Visibility of Malware vs. Malicious Intent [3] Based on the study at Georgia Tech, we propose a revised and generalized theoretical framework for classifying rootkits in section III. In section IV, we explain the methodology of our Rootkit Behavioral Analysis and Classification System (RBACS). In section V, we test our classification system on a sample of rootkits and describe the experimental results. Finally, we provide a discussion of some of the related work in section VI, an outline of our future research plans in section VII, and a conclusion to the paper in section VIII. II. PREVIOUS STUDIES IN COMPUTER VIROLOGY Frederick Cohen was the individual that coined the phrase Computer Virus and gave the first abstract theory of computer viruses. Cohen [4] defined a computer virus as a program that can infect other programs by modifying them to include a possibly evolved copy of itself. He went on to explain that a virus can spread throughout a network and can infect the programs of every user. Each infected program can in turn infect other programs, and so the virus spreads all through the system. We found a recent theoretical study conducted at Georgia Tech that seems to have a similar research focus to ours. Levine et al. [5] developed a framework for classifying rootkits by making use of a previous framework for modeling Trojans and computer virus infections. Thimbleby et al. [6] categorized Trojans into four groups: /10 $ IEEE DOI /WKDD
2 DIRECT MASQUERADES: malicious programs that pretend to be normal programs, such as a program called dir that does NOT list a directory; SIMPLE MASQUERADES: programs that seem so attractive that users are tempted to use them immediately, before having them fully tested, such as a program called sex; SLIP MASQUERADES: programs having names that are very similar to legitimate program names, such as a program called dr that is activated if the user incorrectly types dir; and ENVIRONMENTAL MASQUERADES: programs that are not easily identifiable and carry out some malicious activities in addition to the tasks that the programs were intended for, such as a music CD that plays music but also executes some damaging code as a side-effect. The work by Levine et al. [5] is more specific and restricted as they tried to classify rootkits masquerading as existing programs, either as new rootkits or as modifications of existing rootkits. We followed Levine s work to develop our framework as it is most applicable to the future trends of malware. However, we observe that Levine s framework only addresses a small class of malware. We also discover the limitations of their framework by identifying its inadequacies in classifying all types of rootkits. Hence, we propose a new generalized framework that categorizes all existing rootkits as well as future polymorphic rootkits. Levine s study introduced set theory to categorize rootkits. More specifically, they focused on the Environmental Masquerades mentioned in Thimbleby s paper and started with the following two programs: was the original program, and p 2 was a malicious version of program that provided some additional rootkit functionality. A: Entirely New B: Modification Existing Rootkit New Rootkit D: Extension E: Subset Figure 2. Theoretical Framework for Classifying Rootkits [5] C: Identical Levine and his colleagues used {((p i ))} to symbolically represent a set of possible functionalities for a program p i. Thus, it follows that {(( ))} {((p 2 ))}, but {(( ))} {((p 2 ))} since there was at least one element in {((p 2 ))} that did not belong in {(( ))}. The difference Δ between p 2 and contained only those elements belonging to {((p 2 ))} that were not in {(( ))}, and this difference was defined as {((p ))} = {((p 2 ))} \ {(( ))}. Next, they assumed that they had identified another rootkit of called p 3 and proceeded to check the following equation: {((p 3 ))} - [{((p ))} {((p 3 ))}] = {(( ))} (1) They could then categorize p 3 as either a brand new rootkit, a modification of an existing rootkit, or identical to an existing rootkit as follows. If equation 1 was true, Levine and his colleagues concluded that the rootkit p 3 was the same as rootkit p 2 and {((p 3 ))} contained the same elements as {((p 2 ))}. On the other hand, if the equation was not true but some elements of {((p ))} were contained in {((p 3 ))}, then p 3 could be considered a modification of p 2. If no elements of {((p ))} were contained in {((p 3 ))}, then p 3 was an entirely new rootkit. We wish to include the possibility that a newly discovered rootkit is a modification of two or more existing rootkits. It is not possible to extend the framework presented by Levine and his colleagues, however, as there is a fundamental flaw in their paper. Figure 2 illustrates this framework for the classification of rootkits. They considered only three out of a possible five cases for classifying a newly discovered rootkit. These three cases can occur when a rootkit is entirely new (part A), a modification of an existing rootkit (part B) or identical to an existing rootkit (part C). They failed to consider the case that a rootkit could be an extension of an existing rootkit (part D) and, more importantly, also failed to consider the possibility that the newly discovered rootkit could be a proper subset of an existing rootkit (part E). This is certainly possible: Rieck et al. [7] discovered that the Doomer worm is in fact an extension of the Gobot worm, and it is thus not inconceivable that we could find a rootkit that is an extension or subset of another rootkits. In part E, it might be the case that some malicious hackers first release a rootkit into the wild and then, at some later date, release a more compact newer version of the rootkit. If this was the situation, then Levine s mathematical framework would fail to identify the newer version of the rootkit, as outlined below: For part E, if {((p 3 ))} {((p 2 ))} and since {((p ))} = {((p 2 ))}\{(( ))} was defined as the difference Δ between p 2 and, it follows that {((p ))} {((p 3 ))} = {((p 3 ))} - {(( ))}. Thus, from equation 1, we have {((p 3 ))} - [{((p ))} {((p 3 ))}] = {((p 3 ))} - [{((p 3 ))} - {(( ))}] = {(( ))}. Since equation 1 is true, Levine and his colleagues would conclude that the new rootkit is identical to an existing 76
3 rootkit, which is not true. We propose to revise and generalize the framework in the following section. III. GENERALIZED THEORETICAL FRAMEWORK We now revise and generalize the theoretical framework for categorizing rootkits that was suggested by Levine and his colleagues. In their framework, they considered the possibility that a rootkit that has just been detected is actually a modification of an existing rootkit. In our framework, we wish to generalize this and include the possibility that the newly discovered rootkit has adopted some of the functionalities from two (or more) existing rootkits. This is illustrated in figure 3 and is not beyond the realm of possibility. With Rieck et al. [7] having found the coupling of two different malware families, namely the Backdoor.Zapchast and Worm.Parite families, it would certainly not be surprising to find a rootkit that had emerged from two distinct rootkit families. For our proposed framework, we first start with the following two assumptions: Assume that there are n-1 known rootkits of : p 2, p 3, p 4,, p n, and Assume that a new rootkit p n+1 has been detected. Next, we define: {((X i ))} = [{((p n+1 ))}\{(( ))}] [({((p i ))}\{(( ))}] as the common functionalities of rootkit p i (for some i, where 2 i n) and the newly discovered rootkit p n+1, and then consider the following equation: [{((X 2 ))} {((X 3 ))} {((X 4 ))} {((X n ))}] = Φ (2) If equation 2 is true, then {((X i ))} = Φ for all i (2 i n) and we can conclude that the new rootkit is completely different from each of the previously known rootkits. If equation 2 is not true, on the other hand, then there exists some j (2 j n) such that {((X j ))} Φ and we conclude that the new rootkit has some common functionality with at least one of the previously known rootkits, in this case rootkit p j. Since we are dealing with a finite number of rootkits, we can sequentially test each {((X j ))} (for j = 2, 3, 4,, n) to find all the rootkits that have some common functionality with the new rootkit. A. Algorithm for Classifying Rootkit Variants One reason for the proliferation of rootkits is the ease with which these rootkits can be implemented [8]. The developers of these rootkits often sell different versions of their product that other malicious hackers can purchase and subsequently deploy. These toolkits can be used to generate variants within a particular family of rootkits. Using the toolkit, even criminally minded hackers with just a minimum amount of programming experience can configure the rootkit for the particular task that they require. For instance, the hacker could specify the precise URLs that will trigger the keylogging or form grabbing capabilities of the rootkit to begin capturing data. A unique variant is generated whenever the rootkit is used for a specific purpose by different individuals or groups. In this subsection, we describe an algorithm for classifying these rootkit variants. The algorithm makes use of our generalized theoretical framework for classifying rootkits, which will be useful in finding the functionalities that a newly discovered rootkit has in common with the existing rootkits. For our algorithm, we will use the following notation to represent the families of rootkits: Families of rootkits: F 1, F 2, F 3, Within each of these families, there will likely be several variants that have been generated using the toolkits mentioned previously, and we will use the following notation to represent these variants: Variants within the F i family of rootkits: p i2, p i3, p i4, which are all malicious versions of program p i1 with some additional rootkit functionality. Ste Find the particular functionalities of existing rootkits. Step 2 Determine the common and prominent functionalities of each family of rootkits F 1, F 2, F 3, Existing Rootkit Existing Rootkit New Rootkit Step 3 Classify newly detected rootkits based on the characteristics of each family. Figure 3. Generalized Framework for Classifying Rootkits Figure 4. Algorithm for Classifying Rootkit Variants 77
4 The algorithm is illustrated in figure 4. In ste, we first search for particular functionalities of specific rootkits. In this study, we focused on inline function hooks [12]. Rootkits create these types of hooks by overwriting the first five bytes of an API function with a JUMP instruction. (The first byte in the function is replaced with the value E9, the opcode for a JUMP instruction in assembly language, and the remaining four bytes contain a 32-bit address of some malicious code.) Thus, in this step, we keep track of all of the API functions that were found to be hooked and we also note the associated Windows processes. Step 2 is used to determine the prominent functionalities of each family; for example, a particular family of rootkits might hook certain API functions. We make the same assumption that was made by Fu et al. [9]; that is, we assume that there would only be some slight differences between the functionality of the variants within a particular family. In other words, we use the collection of inline function hooks that were created by the rootkit to determine which family it belongs to. In step 3, we would be in a position to use the characteristics of each of the families to classify newly detected rootkits. In order to determine if such a new threat is a variant that belongs to an existing family or possibly to an entirely new family, there are several abstraction layers that can be used to make this decision. Focusing on one of the lower layers, such as content-based signatures, might be insufficient to cope with the polymorphic techniques that are being used to prevent such matching. Common obfuscation methods that make it difficult to detect variants within a family include [10]: NOP-INSERTION: insert dead-code into a program; CODE TRANSFORMATION: rearranging the order of instructions; REGISTER REASSIGNMENT: replace the usage of one register with another; and INSTRUCTION SUBSTITUTION: swap a set of instructions with an equivalent set. To avoid such difficulties, we suggest a higher abstraction layer. We follow the methodology that was suggested by Bailey et al. [11] and define malware by what it actually does, such as hooking certain API functions. In section V, we describe in detail the cross-validation technique that we used to verify that a sample of rootkits was classified into appropriate families. IV. METHODOLOGY In this section, we describe our Rootkit Behavioral Analysis and Classification System (RBACS) and outline the process for conducting our experiment. An overview of the system is illustrated in figure 5. Sun Microsystem s VirtualBox was installed on an Ubuntu host operating system and Microsoft s Windows XP was then installed inside the virtual environment as a guest operating system. We obtained 78 rootkit samples from the Offensive Computing website and ran each sample, one by one, in the virtual environment. After running each sample, we restored the system back to its original settings. Rootkits make use of several different hooking techniques to remain hidden, such as import address table (IAT) hooking, export address table (EAT) hooking, inline function hooking and system service descriptor table (SSDT) hooking [12]. To test our system, we focused in this case strictly on rootkits that use inline function hooking techniques, but plan to include the other hooking techniques in our future research. For each rootkit sample, we used McAfee s Rootkit Detective to detect the hooks had been created within the Windows XP operating system. After running this tool, a log file containing all the inline function hooks was generated. Pyroto s Parse-O-Matic parser was then used to extract the important information about each hook from the log file: the Windows process that was being affected and the API function that was being hooked. Prior to executing the rootkits, we observed that there were a total of 26 processes running on the clean system. Furthermore, after testing all 78 rootkit samples and combining the log files that had been generated, we counted a total of 60 different API functions that had been hooked. Using a spreadsheet, we then created a large table with 78 rows (one row for each rootkit) and 1560 columns (60 columns for each of the 26 processes). The table contained 0/1 binary values, with a 1 meaning that a particular rootkit had managed to hook a certain API function in a specific Windows process. In total, the 78 rootkit samples had created 11,159 inline function hooks. The final step in the process involved taking the binary data in the table and creating a dataset. The dataset, thus, consisted of 1560 attributes and 78 instances. We then applied the expectation-maximization (EM) algorithm on the dataset. The EM algorithm was available for implementation in the Wakaito Environment for Knowledge Analysis (WEKA) [13]. The results of our experiment are described in the next section. Controlled Environment for Testing Rootkits Rootkit Hook Detector Parser Spreadsheet Data Mining Software Figure 5. System Overview 78
5 TABLE I. Number of Samples EXPERIMENTAL RESULTS Antivirus Labels ClamAV Worm.Korgo.Z BitDefender Backdoor.Berbew.Be.DAM ClamAV Trojan.Crypted-29 ClamAV Trojan.Crypted-29 FProt W32.Berbew.G ClamAV Trojan.Qukart-8 ClamAV Trojan.Qukart-10 ClamAV Trojan.Qukart-17 ClamAV Trojan.Crypted-28 AVGScan I-Worm.Nuwar.N ClamAV Trojan.Crypted-28 BitDefender Trojan.Spy.Qukart.Z FProt W32.Berbew.G 2 ClamAV Trojan.Bancos ClamAV Worm.Feebs.AE BitDefender Win32.Worm.Feebs.1.Gen 1 Kaspersky Worm.Win32.Feebs.a 1 BitDefender Trojan.PWS.Papras.A 1 BitDefender Trojan.PWS.Papras.O 1 BitDefender Trojan.PWS.Papras.F 2 BitDefender Trojan.PWS.Papras.L V. EXPERIMENTAL RESULTS As mentioned, the rootkit samples for our experiment had all been obtained from the Offensive Computing website. This website uses five different antivirus scanners to label their malware samples: FProt BitDefender Kaspersky ClamAV AVGScan The 78 samples that we had obtained from this website had each been labeled by at least one of these antivirus scanners. For our experiment, however, we chose NOT to use these labels. We instead preferred to build a model using unsupervised clustering, where the instances had not been pre-classified. Successfully categorizing samples using unsupervised clustering would show greater evidence of the strength of our system than if we had used supervised clustering. We chose to use the EM algorithm for clustering our dataset. An advantage of using the EM algorithm is that the most appropriate number of clusters can be found automatically. This differs from the k-means algorithm, for example, where the number of clusters needs to be specified a priori. For each instance, the EM algorithm calculates the probability that it belongs to each of the different clusters and proceeds as follows. The number of clusters is initially set to one. The dataset is then randomly split into ten folds, with nine folds making up the training set and one fold designated as the test set. This procedure is repeated 10 times, using a different fold as a test set each time. The loglikelihood is calculated each time and the results are then averaged over all ten trials. If the loglikelihood increases, then the number of clusters is increased by one and the procedure is repeated. [13] This cross-validation method produced the following results. The 78 samples were clustered into five families: The 21 samples that had been labeled as Berbew by the BitDefender Antivirus scanner were all grouped into the same family F 1. The 35 samples that had been labeled as Berbew by the FProt antivirus scanner were all grouped into the same family F 2. The two samples that had been labeled as Bancos were both grouped into the same family F 3. The 15 samples that had been labeled as Feebs were all grouped into the same family F 4. The five samples that had been labeled as Papras were all grouped into the same family F 5. The results of our experiment are summarized in table I. We have shown that our system can be used to successfully categorize a sample of rootkits that use inline function hooking. It is important to reiterate that the sample was NOT pre-classified; we only used the labels that were assigned by the five antivirus scanners to validate our results. Our hope is that system administrators might benefit from this system. If a system administrator detects some inline function hooks on a particular machine, he or she could then use our classification system to determine the family of that rootkit. Armed with that knowledge, the system administrator could then proceed and take further action. VI. RELATED WORK Kolter et al. [14] extracted n-grams from malicious executable files and, like our work, used the WEKA data mining software package to classify the malware samples into families. Their approach involved a static analysis of the executable files. Our goal, on the other hand, used a dynamic analysis approach and attempted to address a situation that a system administrator might be faced with. System administrators often find one of their machines behaving abnormally because of a rootkit infection and his or her immediate concern would be to try to determine what he or she was dealing with. Our system tries to deal with this concern. Bayer et al. [15] had a more similar system design to ours in that they started with a dynamic analysis of each sample in a controlled environment and ended up with clusters of families. The goal of their system was to cluster malware samples based on their behavior. Our research was more 79
6 focused, however, as we used the rootkit hooks to differentiate between the various families. VII. FUTURE WORK This research focused on a sample of rootkits that used inline function hooking techniques. As mentioned earlier, we plan to expand our system by adding other types of rootkits and test on a larger sample set; in particular, we plan to analyze rootkits that hook the IAT, EAT and SSDT. In addition to detecting the hooks that had been created on a system, an investigator might find other clues from a rootkit-infected machine. It might be the case, for example, that a rootkit disables the antivirus software or turns off the firewall on a system. We intend to add these and other functionalities to our dataset in the future. When conducting our experiment, we tested just one rootkit sample at a time on a clean system, and then restored the system back to the clean state before testing the next sample. In reality, though, it is often the case that a machine is found with more than one infection. In future experiments, we would like to determine if our system can handle the situation in which more than one rootkit is running on a system. Finally, having a large and sparse dataset, we plan to look into the possibility of using techniques from principal components analysis (PCA) for our study. VIII. CONCLUSION The first contribution of our paper was to address the limitations of the existing theoretical frameworks for classifying rootkits and to then develop a revised framework. The second contribution was to propose a new system for categorizing rootkits that was based on this framework. Our system managed to categorize 78 rootkit samples into five groups using unsupervised clustering. We then used the labels from five different antivirus scanners to verify the effectiveness of our clustering algorithm. There still remains one unanswered question, though. Just a quick look through table 1 would be enough to conclude that there is quite a large discrepancy in the way that antivirus companies label their malware samples. The question is, why is there such a lack of consistency between antivirus labels? Bailey et al. [11] attempted to address this issue. They conjectured that some antivirus companies had the ability to more effectively differentiate small variations in a family of malware. An antivirus company with this ability would obviously assign a greater number of unique labels to their malware samples. From a network or system administrator s point of view, having several different labels for the same infection would certainly cause confusion. These administrators would be especially concerned during outbreaks since they could not be certain if the protection that they had in place would be adequate. Having a common label that is shared among all antivirus companies would help to alleviate this confusion and there are projects underway, such as the Common Malware Enumeration (CME) [16], to accomplish just this. Our hope is that our research would also benefit projects such as the CME. ACKNOWLEDGMENT This research was supported in part by the Westpac Banking Corporation, IBM Australia and the Victorian Government in Australia. We would like to thank Prof Lynn Batten for her helpful comments. REFERENCES [1] A. Emigh, The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond, Journal of Digital Forensic Practice, Vol. 1(3), Sept. 2006, pp [2] McAfee, Rootkits - Part 1 of 3: The Growing Threat, McAfee Inc., Apr [3] OECD, Malicious Software (Malware): A Security Threat to the Internet Economy, Organization for Economic Cooperation and Development, June 2008, OECD Ministrial Meeting on the Future of the Internet Economy [4] F. Cohen, Computer Viruses: Theory and Experiments, Computer and Security, Vol. 6(1), Feb. 1987, pp , Elsevier Advanced Technology Publications [5] J. F. Levine, J. B. Grizzard, and H. L. Owen, Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection, IEEE Security & Privacy, Vol. 4(1), Jan. 2006, pp [6] H. Thimbleby, S. Anderson, and P. Cairns, A Framework for Modelling Trojans and Computer Virus Infection, Computer Journal, Vol. 41(7), 1998, pp , British Computer Society [7] K. Rieck, T. Holz, C. Willems, P. Düssel1 and P. Laskov, 2008, "Learning and Classification of Malware Behavior", Detection of Intrusions and Malware, and Vulnerability Assessment, Lecture Notes in Computer Science, Volume 5137, pp , Springer [8] S. Hultquist, Rootkits: the next big enterprise threat?, Information Age, Aug./Sept [9] W. Fu, J. Pang, R. Zhao, Y. Zhang and B. Wei, "Static Detection of API-Calling Behavior from Malicious Binary Executables", Proceedings of the International Conference on Computer and Electrical Engineering, 2008, pp , IEEE Computer Society [10] M. Christodorescu and and S. Jha, Static analysis of executables to detect malicious patterns, Proceedings of the 12th conference on USENIX Security Symposium, Vol. 12, 2003 [11] M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian and J. Nazario, 2007, Automated Classification and Analysis of Internet Malware, Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, Vol. 4637, pp , Springer [12] G. Hoglund, and J. Butler, Rootkits: Subverting the Windows Kernel, 2005, Addison-Wesley Professional [13] I. H. Witten and E. Frank, Data Mining: Practical machine learning tools and techniques, 2nd Edition, 2005, Morgan Kaufmann [14] J. Z. Kolter, Learning to Detect and Classify Malicious Executables in the Wild, The Journal of Machine Learning Research, Vol. 7, Dec. 2006, pp [15] U. Bayer, P. Milani Comparetti, C. Hlauschek, C. Kruegel and E. Kirda, Scalable, Behavior-Based Malware Clustering, Proceedings of the 16th Annual Network & Distributed System Security Symposium, 2009 [16] D. Beck and J. Connolly, The Common Malware Enumeration Initiative, Proceedings of the Virus Bulletin Conference,
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING MONISHA.T #1 and Mrs.UMA.S *2 # ME,PG Scholar,Department of CSE, SKR Engineering College,Poonamallee,Chennai,TamilNadu * ME,Assist.professor,
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks Priyank Singhal Student, Computer Engineering Sardar Patel Institute of Technology University
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
Virus Bulletin 2013 The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications Next Generation Intelligent Networks Research Center (nexgin RC) http://wwwnexginrcorg/
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Inside Windows Rootkits
Chris Ries Security Research Engineer VigilantMinds Inc. 4736 Penn Avenue Pittsburgh, PA 15224 [email protected] Introduction Although they have been around for quite some time, rootkits have become
E Commerce and Internet Security
E Commerce and Internet Security Zachary Rosen, CFE, CIA President, ACFE Czech Republic Chapter Introduction The Internet has become a global phenomenon reshaping the way we communicate and conduct business.
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY ABHILASH SREERAMANENI DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SEOUL NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY
LASTLINE WHITEPAPER. Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade
LASTLINE WHITEPAPER Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade Abstract Malicious code is an increasingly important problem that threatens the security of computer systems. The
Using big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst [email protected] http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
One Minute in Cyber Security
Next Presentation begins at 15:30 One Minute in Cyber Security Simon Bryden Overview Overview of threat landscape Current trends Challenges facing security vendors Focus on malware analysis The year? The
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Alternate Data Streams in Forensic Investigations of File Systems Backups
Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney [email protected] and [email protected]
Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016
Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Detecting the Presence of Virtual Machines Using the Local Data Table
Detecting the Presence of Virtual Machines Using the Local Data Table Abstract Danny Quist {[email protected]} Val Smith {[email protected]} Offensive Computing http://www.offensivecomputing.net/
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices
350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Cloud Based Secure Web Gateway
Cloud Based Secure Web Gateway DR160203 March 2016 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Product Tested... 4 Test Focus... 4 How We Did It... 5 Test Bed Setup... 5 Test
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
CERIAS Tech Report 2015-9 Basic Dynamic Processes Analysis of Malware in Hypervisors Type I & II by Ibrahim Waziri Jr, Sam Liles Center for Education
CERIAS Tech Report 2015-9 Basic Dynamic Processes Analysis of Malware in Hypervisors Type I & II by Ibrahim Waziri Jr, Sam Liles Center for Education and Research Information Assurance and Security Purdue
Zscaler Cloud Web Gateway Test
Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the
Code Injection From the Hypervisor: Removing the need for in-guest agents. Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs
Code Injection From the Hypervisor: Removing the need for in-guest agents Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs SADE: SteAlthy Deployment and Execution Introduction
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Active Threat Control
Active Threat Control Proactive Protection Against New and Emerging Threats Why You Should Read this White Paper The unprecedented rise of new threats has deemed traditional security mechanisms both ineffective
Top Ten Cyber Threats
Top Ten Cyber Threats Margaret M. McMahon, Ph.D. ICCRTS 2014 Introduction 2 Motivation Outline How malware affects a system Top Ten (Simple to complex) Brief description Explain impacts Main takeaways
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
User Documentation Web Traffic Security. University of Stavanger
User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
Cascadia Labs URL Filtering and Web Security
Presented by COMPARATIVE REVIEW Cascadia Labs URL Filtering and Web Security Results from Q4 2008 Executive Summary Companies rely on URL filtering and Web security products to protect their employees,
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,
ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280. www.semargroup.org
ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280 www.semargroup.org Firewall Policy Anomaly Detection and Resolution R.V.DARADE 1, PROF.P.B.KUMBHARKAR 2 1 Dept of Computer Engineering, SCOE, Sudumbare,
Protecting Anti-virus Programs From Viral Attacks
Protecting Anti-virus Programs From Viral Attacks By- Umakant Mishra, Bangalore, India [email protected], Contents 1. Introduction...1 2. Weak Points of an Anti-Virus Program...2 3. How to Prevent Attacks
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
Malware: Malicious Code
Malware: Malicious Code UIC 594/Kent Law: Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations 2007, 2008 Robert H. Sloan Malicious code: Viruses Most famous type of
What's the difference between spyware and a virus? What is Scareware?
What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Evaluating Microsoft s protection performance and capabilities
Evaluating Microsoft s protection performance and capabilities How the Microsoft Malware Protection Center evaluates its ability to keep customer computers secure. Evaluating Microsoft s protection performance
Keystroke Encryption Technology Explained
Keystroke Encryption Technology Explained Updated February 9, 2008 [email protected] (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption
Evaluating the Perceptions of People towards Online Security
Section 2 Information Systems Security & Web Technologies and Security Evaluating the Perceptions of People towards Online Security Abstract N.K.Jayakumar and A.D.Phippen Network Research Group, University
ESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.
Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
Securing the endpoint and your data
#SymVisionEmea #SymVisionEmea Securing the endpoint and your data Piero DePaoli Sr. Director, Product Marketing Marcus Brownell Sr. Regional Product Manager Securing the Endpoint and Your Data 2 Safe harbor
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
