Malware detection methods for fixed and mobile networks



Similar documents
Popular Android Exploits

Defending Behind The Device Mobile Application Risks

The Behavioral Analysis of Android Malware

Mobile App Reputation

Symantec Advanced Threat Protection: Network

Fighting Advanced Threats

Zscaler Cloud Web Gateway Test

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

User Documentation Web Traffic Security. University of Stavanger

Cisco Advanced Malware Protection Sandboxing Capabilities

Messing with the Android Runtime

The Hillstone and Trend Micro Joint Solution

WHITE PAPER. Understanding How File Size Affects Malware Detection

Recurrent Patterns Detection Technology. White Paper

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Introduction to Android

Analysis of advanced issues in mobile security in android operating system

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Pentesting Android Apps. Sneha Rajguru

Hacking your Droid ADITYA GUPTA

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

One Minute in Cyber Security

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

WildFire. Preparing for Modern Network Attacks

DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket

Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Hey, We Catch You: Dynamic Analysis of Android Applications. Wenjun Hu(MindMac) PacSec, Tokyo

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Android Security - Common attack vectors

LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Spyware Analysis. Security Event - April 28, 2004 Page 1

Networks and Security Lab. Network Forensics

Protecting against Mobile Attacks

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Host-based Intrusion Prevention System (HIPS)

Spear Phishing Attacks Why They are Successful and How to Stop Them

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?

ESET ENDPOINT SECURITY FOR ANDROID

SSL Performance Problems

Unified Security, ATP and more

Mobile Malware and Spyware: Working Through the Bugs. Detective Cindy Murphy

Reversing Android Malware

Android Security Joshua Hodosh and Tim Leek

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Bypassing SSL Pinning on Android via Reverse Engineering

Cisco Security Intelligence Operations

DETERMINATION OF THE PERFORMANCE

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

ESET MOBILE SECURITY FOR ANDROID

Configuring WildFire. Version 1.0 PAN-OS Johan Loos.

VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION

Carbon Black and Palo Alto Networks

Hardware Malware Detectors

Security Best Practices for Mobile Devices

Operation Liberpy : Keyloggers and information theft in Latin America

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Cisco Advanced Malware Protection for Endpoints

Risk-Rating Framework for Mobile Applications (Sponsored by DISA CTO)

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Netsweeper Whitepaper

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Introducing IBM s Advanced Threat Protection Platform

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -

DYNAMIC DNS: DATA EXFILTRATION

WebView addjavascriptinterface Remote Code Execution 23/09/2013

Hesperbot. Analysts at IKARUS Security Software GmbH successfully removed a self-locking Android Malware from an infected smartphone

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Secure Web Gateways Buyer s Guide >

KASPERSKY FRAUD PREVENTION PLATFORM COVERING ONLINE AND MOBILE BANKING RISKS

Transcription:

Malware detection methods for fixed and mobile networks Gavin McWilliams January 2013 g.mcwilliams@qub.ac.uk

Academic Centre of Excellence in Cyber Security Research

Presentation Outline Malware detection methods for fixed and mobile networks 1. Android Malware Detection Machine learning approach using automated static code analysis 2. Zeus Botnet Detection Realtime Network Traffic & Content Analysis 3. Question & Answers

Background/Motivation Android mobile platform is becoming more popular with estimated 675,000 apps in the official Google's Android Market and downloads in excess of 25 billion. As the popularity of Android grows, so is malware targeting the platform, primarily spread via: Repackaged apps to piggyback payload Update attacks Drive-by downloads Growing sophistication to circumvent detection by mobile antivirus software. (A recent study reveals 79.6 % best case to 20.2 % worst case detection) Cumulative growth of collected Android mobile malware samples. Two major outbreaks AnserverBot (Starting Sept. 2011) and DroidKungFu (starting June 2011) are highlighted. Both are still actively evolving to evade detection from existing anti-virus software.

Background/Motivation Android malware remain undetected for up to three months Google s Bouncer introduced in Feb. 2011 uses dynamic analysis and can be circumvented. Several third party Android Marketplaces exist, most without app scrutiny The above motivates our machine learning based approach using static analysis. Main advantages: Malware cannot modify its behaviour during analysis Proactive and fast Flexible and easily automated Can complement signature-based and/or dynamic methods for unknown malware

Machine Learning Model Our approach uses Bayesian Classification models obtained from automated static analysis of Android packages. Models are built from collection of app and code characteristics that provide indicators of potential malicious activities. The models are evaluated with 1000 real malware samples from 49 existing families including DroidKungFu, AnserverBot, Plankton, Pjapps, DroidDream, Geinimi etc. Malware samples are from both official and alternative Android markets.

Android app reverse engineering Android applications are written in Java and packaged along with data and resource files into a single compressed.apk package. The package contains: Manifest (where permissions and components are declared) Dalvik executable file (single.dex file with complete Dalvik bytecode) /assets and /res folders to hold binary, XML-based resources, Libraries etc. Java-based apk analyzer reverse engineers these files and applies property detectors to extract features for training the Machine learning model.

Android package analyzer Mine manifest.xml.clean files to extract features Extract from.apk files into folders Convert Manifest.xml binary to readable manifest.xml.clean Build profile(s) Disassemble each classe.dex file to constituent.smali Mine.smali files to extract features Functional steps of custom built Android package analyzer

App Property Detectors The property detectors include: API calls detectors: used to detect use of API s e.g. Telephony Manager APIs for accessing IMSI, IMEI, sending/receiving SMS, listing/installing other packages etc. Command detectors: used to detect references to system commands e.g. chmod, mount /system/bin/su chown, etc. Permission detectors: used to detect permissions requested at runtime as declared in the Manifest file.

Feature ranking and selection Thus, 58 different feature attributes (excluding permissions) are defined as matching criteria for the property detectors. These criteria are derived from commonly observed attributes used to detect suspicious activity manually by security analysts. A feature ranking and selection function ranks these according to relevance using Mutual Information calculation:

Top 25 Ranked Features Top 25 MI ranked features based on 1000 malware and 1000 benign apps corpus Features Benign Malware getsubscriberid (TelephonyManager) 42 742 getdeviceid (TelephonyManager) 316 854 getsimserialnumber (TelephonyManager) 35 455.apk (secondary payload) 89 537 intent.action.boot_completed 69 482 chmod (system command) 19 389 Runtime.exec( ) (Executing process) 62 458 abortbroadcast (intercepting broadcast notifications) 4 328 getline1number (TelephonyManager) 111 491 /system/app 4 292 /system/bin 45 368 createsubprocess (creating child process) 0 169 getsimoperator (TelephonyManager) 37 196 remount (system command) 3 122 DexClassLoader (stealthily loading a class) 16 152 pm install (installing additional packages) 0 98 getcallstate (TelephonyManager) 10 119 chown (system command) 5 107.jar (secondary payload) 87 252 mount (system command) 29 152 KeySpec (code encryption) 99 254 /system/bin/sh 4 90 SMSReceiver 3 66 getnetworkoperator (TelephonyManager) 202 353 SecretKey (code encryption) 119 248

Experimental Scenario With feature vectors built from the top 25 MI-ranked features, the Bayesian classifier model is trained to classify apps into benign or suspicious. The model is evaluated using N-fold validation technique by varying number of features and number of training samples. True positive rate, True negative rate, accuracy, error rate, false positive rate etc. are determined.

Classification results 1.00 0.90 0.80 0.70 0.60 0.50 0.40 ERR ACC 0.30 0.20 0.10 0.00 5fL 5fT 10f 15f 20f Error and Accuracy based on Bayesian classification

Conclusions / Summary Android malware is growing in scale and complexity Static analysis coupled with machine learning is an effective tool for filtering apps to detect unknown Android malware Based on experiments with real malware samples > 90% detection rate obtainable with low false positives using Bayesian classification. Higher detection rates are possible with the ML + static analysis method. Viable approach for filtering large amounts of apps added to Android market on daily basis (estimated 1200 daily).

ZeuS (aka Zbot) Trojan first observed in middle 2007 HTTP as command and control mechanism Targets mostly financial institutions (banks!) Spreads by drive-by-download and phishing attacks Polymorphic: signature-based detection difficult Suicide-trojan: able to self-destruct Activity increased by 130% between 2009 and 2010 (www.eset.com)

ZeuS (aka Zbot) Recently merged with SpyEye, dubbed the ZeuS killer! Ice IX botnet based on ZeuS older source code January 2012: Gameover malware traced to maker of ZeuS More distributed C&C (P2P) Launch DDoS attack against targets (e.g., bank, financial institution) immediately after stealing money Diversion: while target deals with attack, criminals launder money (e.g., by purchasing jewelry) Source: ComputerWorld.com

Experimental Setup

Detectable features in ZeuS traffic Double POST requests then response GET, 200 OK, POST, POST, 200 OK, 200 OK Mismatched advertised content-type Content-type: text/html actual content garbage (encrypted/obfuscated) Configuration file signature

Detectable features in ZeuS traffic Periodicity 1 GET requests every 3600s (default) POST requests every 1200s (default) Periodicity 2 Windows XP SP2 Packet size GET/POST requests sizes stay constant within host Pattern observed: x, x-1, x-1, x-1, x-1 (XP SP2) x, x+1, x+1 (XP SP3)

Current Work

g.mcwilliams@qub.ac.uk Gavin McWilliams Engineering Manager g.mcwilliams@qub.ac.uk Stephen Wray Commercial Director s.wray@ecit.qub.ac.uk