MARS: From traffic containment to network reconfiguration in malware-analysis systems

被引:5
作者
Ceron, Joao Marcelo [1 ]
Margi, Cintia Borges [2 ,3 ]
Granville, Lisandro Zambenedetti [4 ]
机构
[1] Univ Sao Paulo, Sao Paulo, SP, Brazil
[2] Univ Sao Paulo, Escola Politecn, Dept Comp & Digital Syst Engn PCS, Sao Paulo, SP, Brazil
[3] Univ Sao Paulo, Escola Artes Ciencias & Humanidades, Sao Paulo, SP, Brazil
[4] Univ Fed Rio Grande do Sul, Inst Informat, Porto Alegre, RS, Brazil
关键词
Network reconfiguration; Malware analysis; Malware Containment;
D O I
10.1016/j.comnet.2017.10.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware analysis systems are essential to characterize malware behavior and to improve defense mechanisms. In dynamic malware analysis, the actions performed by malware in a sandbox are highly dependent on the interactions with other hosts and services. However, the current solutions superficially deal with the network environment that surrounds the sandbox, exposing limitations to traffic containment and network resources reconfiguration. We have already shown how Software-Defined Networking (SDN) could enable network access policies changes and thus exposing distinct malware actions. In this paper, we investigate the malware analysis process by considering the entire analysis environment, including a sandbox and other components that comprise it. We developed a fully-automated malware analysis solution that uses network layer as a tool to reconfigure the analysis environment. In that way, it is possible to implement per-flow containment rules, dynamic resources configuration, and to manipulate network traffic to impersonate services. Our experiments show that it is feasible to identify behavioral deviations in different analysis scenarios and reveal many more malware behaviors than those revealed by the state-of-the-art analysis systems. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:261 / 272
页数:12
相关论文
共 24 条
[1]  
[Anonymous], J UNIVERSAL COMPUTER
[2]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[3]  
Balzarotti D., 2010, EFFICIENT DETECTION
[4]  
Ceron J., 2016, ISCC 2016 21 IEEE S
[5]  
Chen X, 2008, I C DEPEND SYS NETWO, P177, DOI 10.1109/DSN.2008.4630086
[6]  
ClamAv Project,, CLAMAV OP SOURC ANT
[7]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)
[8]  
Fleck Dan, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P92, DOI 10.1109/ARES.2013.16
[9]  
Graziano M, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P339
[10]  
Kirat D, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P287