首页> 外文会议>Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy >Redirecting Malware's Target Selection with Decoy Processes
【24h】

Redirecting Malware's Target Selection with Decoy Processes

机译:通过诱饵进程重定向恶意软件的目标选择

获取原文

摘要

Honeypots attained the highest accuracy in detecting mal-ware among all proposed anti-malware approaches. Their strength lies in the fact that they have no activity of their own, therefore any system or network activity on a honeypot is unequivocally detected as malicious. We found that the very strength of honeypots can be turned into their main weakness, namely the absence of activity can be leveraged to easily detect a honeypot. To that end, we describe a practical approach that uses live performance counters to detect a honeypot, as well as decoy I/O on machines in production. To counter this weakness, we designed and implemented the existence of decoy processes through operating system (OS) techniques that make safe interventions in the OS kernel. We also explored deep learning to characterize and build the performance fingerprint of a real process, which is then used to support its decoy counterpart against active probes by malware. We validated the effectiveness of decoy processes as integrated with a decoy Object Linking and Embedding for Process Control (OPC) server, and thus discuss our findings in the paper.
机译:蜜罐达到了检测所有提议的反恶意软件方法中的麦克照的最高精度。他们的力量在于他们没有自己的活动,因此蜜罐上的任何系统或网络活动都被毫不含糊地检测为恶意。我们发现,蜜罐的强度可以转化为它们的主要弱点,即不存在活动可以利用以容易地检测蜜罐。为此,我们描述了一种使用实时性能计数器检测蜜罐以及生产机器上的蜜蜂I / O的实用方法。为了通过操作系统(OS)技术来对抗这种弱点,我们设计并实施了诱饵过程的存在,该技术在OS内核中进行安全干预。我们还探讨了深度学习,以表征和构建实际过程的性能指纹,然后用于通过恶意软件支持其诱饵对手反对有源探针。我们验证了与诱饵对象集成的诱饵过程的有效性,与过程控制(OPC)服务器联系并嵌入,从而讨论了纸张的研究结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号