首页> 外文会议>IEEE International Symposium on Technologies for Homeland Security >Detecting disguised processes using application-behavior profiling
【24h】

Detecting disguised processes using application-behavior profiling

机译:使用应用程序行为分析检测伪装过程

获取原文

摘要

In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. They also have the shortcoming that they need to be updated frequently to possess the latest malware definitions. This makes them inherently prone to missing novel attack techniques. Misuse detection IDSs however overcome this problem by maintaining a ground truth of normal application behavior while reporting deviations as anomalies. In our approach, we try to accomplish this by observing a process' memory consumption. This is for two reasons: We expect the readings to be less volatile in comparison to for instance network operations. Second, by breaking the problem down, we are able to investigate thoroughly while still laying the foundations for future expansion. We use the observations from a given host to train a machine learning algorithm. After an initial learning phase, we evaluate the model with readings from the application it has been trained on and other applications in order to assess its quality. Our results indicate that the efficacy of this method is highly dependent on parametrizing the machine learning algorithm appropriately. A large variance in accuracy with only slightly altered inputs confirms this suggestion. We finish with a discussion on deploying such an IDS at scale in a realistic scenario.
机译:为了避免检测,恶意软件可以将自己伪装为合法的程序或劫持系统流程以达到其目标。常用的签名基于签名的入侵检测系统(IDS)努力区分这些过程,因此仅用于检测这种攻击的有限用途。它们还具有缺点,即他们需要经常更新以拥有最新的恶意软件定义。这使得它们本质上易于缺少新型攻击技术。然而,误用检测IDS通过维护正常应用程序行为的基础事实,同时报告作为异常的偏差来克服此问题。在我们的方法中,我们尝试通过观察过程的内存消耗来实现这一目标。这是有两个原因:我们希望与例如网络操作相比,读数不那么挥发。其次,通过破坏问题,我们能够彻底调查,同时仍在奠定未来扩张的基础。我们使用给定宿主的观察来训练机器学习算法。在初始学习阶段之后,我们评估应用程序中读数的模型,它已经接受了培训和其他应用程序,以评估其质量。我们的结果表明,该方法的功效高度依赖于适当的机器学习算法。只有略微改变的输入的准确性的大方差证实了这一建议。我们讨论了在现实方案中以规模部署此类ID。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号