首页> 外文会议>IEEE Symposium on Security and Privacy >Siren: Catching Evasive Malware (Short Paper)
【24h】

Siren: Catching Evasive Malware (Short Paper)

机译:警笛:捕捉逃避恶意软件(短文)

获取原文

摘要

With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legitimate activity to blend in and avoid detection. We propose a new system called Siren that injects crafted human input alongside legitimate user activity to thwart these mimicry attacks. The crafted input is specially designed to trigger a known sequence of network requests, which Siren compares to the actual traffic. It then flags unexpected messages as malicious. Using this method, we were able to detect ten spyware programs that we tested, many of which attempt to blend in with user activity. This paper presents the design, implementation, and evaluation of the Siren activity injection system, as well as a discussion of its potential limitations.
机译:随着异常检测系统的日益普及,这是由于零天攻击的增加,攻击者模仿合法活动融入并避免检测的新一类威胁。我们提出了一个名为Siren的新系统,该系统将被制作的人类投入与合法的用户活动一起注入,以阻止这些模仿攻击。 Craffed输入专门设计用于触发已知的网络请求序列,Siren与实际流量相比。然后它将意外消息标记为恶意。使用此方法,我们能够检测到我们测试的十个间谍软件程序,其中许多尝试将与用户活动混合。本文介绍了Siren活动注射系统的设计,实施和评估,以及对其潜在限制的讨论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号