首页> 外文会议>IEEE International Symposium on Technologies for Homeland Security >Detecting disguised processes using application-behavior profiling
【24h】

Detecting disguised processes using application-behavior profiling

机译:使用应用程序行为分析来检测伪装的进程

获取原文

摘要

In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. They also have the shortcoming that they need to be updated frequently to possess the latest malware definitions. This makes them inherently prone to missing novel attack techniques. Misuse detection IDSs however overcome this problem by maintaining a ground truth of normal application behavior while reporting deviations as anomalies. In our approach, we try to accomplish this by observing a process' memory consumption. This is for two reasons: We expect the readings to be less volatile in comparison to for instance network operations. Second, by breaking the problem down, we are able to investigate thoroughly while still laying the foundations for future expansion. We use the observations from a given host to train a machine learning algorithm. After an initial learning phase, we evaluate the model with readings from the application it has been trained on and other applications in order to assess its quality. Our results indicate that the efficacy of this method is highly dependent on parametrizing the machine learning algorithm appropriately. A large variance in accuracy with only slightly altered inputs confirms this suggestion. We finish with a discussion on deploying such an IDS at scale in a realistic scenario.
机译:为了避免检测,恶意软件可以伪装成合法程序或劫持系统进程以达到其目标。常用的基于签名的入侵检测系统(IDS)难以区分这些进程,因此只能有限地用于检测此类攻击。它们还具有需要经常更新以拥有最新恶意软件定义的缺点。这使得它们天生就容易缺少新颖的攻击技术。但是,误用检测IDS通过在将偏差报告为异常的同时保持正常应用程序行为的基本事实来克服此问题。在我们的方法中,我们尝试通过观察进程的内存消耗来实现这一目标。这有两个原因:与网络操作相比,我们希望读数波动较小。其次,通过分解问题,我们可以进行深入调查,同时仍为将来的扩展奠定基础。我们使用来自给定主机的观察结果来训练机器学习算法。在最初的学习阶段之后,我们将使用经过培训的应用程序和其他应用程序的读数评估模型,以评估其质量。我们的结果表明,该方法的有效性高度取决于对机器学习算法的参数设置。准确度的大差异(仅输入略有变化)证实了这一建议。最后,我们讨论了在实际情况下大规模部署这样的IDS。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号