Machine Learning and Recognition of User Tasks for Malware Detection

被引:1
作者
Alagrash, Yasamin [1 ]
Mohan, Nithasha [1 ]
Gollapalli, Sandhya Rani [1 ]
Rrushi, Julian [1 ]
机构
[1] Oakland Univ, Dept Comp Sci & Engn, Rochester, MI 48309 USA
来源
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019) | 2019年
关键词
Malware; compromised computer account; machine learning; decoy process mechanisms;
D O I
10.1109/TPS-ISA48467.2019.00018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware often act on a compromised machine with the identifier of a legitimate user. We analyzed numerous malware and user tasks, and found subtle differences between how the two operate on a machine. We have developed a machine learning approach that characterizes user tasks through their resource utilization. We have found that many routine user tasks retain their resource utilization patterns, despite the occurrence of new dynamics each time a user carries out those tasks. On the other hand, upon landing on a target machine, malware perform a substantial amount of work to explore the machine and discover resources that are of interest to threat actors. Our approach collects live performance counter data from the operating system kernel, and subsequently pre-processes and analyzes those data to learn and then recognize the resource utilization of a task. We develop decoy process mechanisms that camouflage performance counter data to prevent malware from learning the resource utilization of a user task. We tested our approach against both legitimate users in real-world work settings and malware samples, and discuss our findings in the paper.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 24 条
[1]  
[Anonymous], P ISOC NETW DISTR SY
[2]  
[Anonymous], 2010, P CSIIRW
[3]   A Malware and Variant Detection Method Using Function Call Graph Isomorphism [J].
Bai, Jinrong ;
Shi, Qibin ;
Mu, Shiguang .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[4]   STATISTICAL INFERENCE FOR PROBABILISTIC FUNCTIONS OF FINITE STATE MARKOV CHAINS [J].
BAUM, LE ;
PETRIE, T .
ANNALS OF MATHEMATICAL STATISTICS, 1966, 37 (06) :1554-&
[5]  
Beal MJ, 2002, ADV NEUR IN, V14, P577
[6]  
Chein M, 2009, ADV INFORM KNOWL PRO, P1
[7]   @spam: The Underground on 140 Characters or Less [J].
Grier, Chris ;
Thomas, Kurt ;
Paxson, Vern ;
Zhang, Michael .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :27-37
[8]   A graph-based approach to detecting tourist movement patterns using social media data [J].
Hu, Fei ;
Li, Zhenlong ;
Yang, Chaowei ;
Jiang, Yongyao .
CARTOGRAPHY AND GEOGRAPHIC INFORMATION SCIENCE, 2019, 46 (04) :368-382
[9]   Comparing Anomaly-Detection Algorithms for Keystroke Dynamics [J].
Killourhy, Kevin S. ;
Maxion, Roy A. .
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, :125-134
[10]  
Navarro J., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P97, DOI 10.1109/SPW.2012.22