Dynamic Whitelisting Using Locality Sensitive Hashing

被引:1
作者
Pryde, Jayson [1 ]
Angeles, Nestle [1 ]
Carinan, Sheryl Kareen [1 ]
机构
[1] Trend Micro Inc, Rockwell Business Ctr, 7th Floor,Tower 2,Ortigas Ave, Pasig, Philippines
来源
TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2018 WORKSHOPS | 2018年 / 11154卷
关键词
Whitelisting; Locality sensitive hashing; TLSH;
D O I
10.1007/978-3-030-04503-6_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Computer systems may employ some form of whitelisting for execution control, verification, minimizing false positives from other detection methods or other purposes. A legitimate file in a whitelist may be represented by its cryptographic hash, such as a hash generated using an SHA1 or MD5 hash function. Due to the fact that any small change to a file in a cryptographic hash results in a completely different hash, a file with a cryptographic hash in a whitelist may no longer be identifiable in the whitelist if the file is modified even by a small amount. This prevents a target file from being identified as legitimate even if the target file is simply a new version of a whitelisted legitimate file. Locality Sensitive Hashing is a state of the art method in big data and machine learning for the scalable application of approximate nearest neighbor search in high dimensional spaces [9]. The identification of executable files which are very similar to known legitimate executable files fits very well within this paradigm. In this paper, we show the effectiveness of applying TLSH [1,2]; Trend Micro's implementation of locality sensitive hashing, to identify files similar to legitimate executable files. We start with a brief explanation of locality sensitive hashing and TLSH. We then proceed with the concept of whitelisting, and describe typical modifications made to legitimate executable files such as security updates, patches, functionality enhancements, and corrupted files. We will also describe the scalability problems posed by all the legitimate executable files available on the Windows OS. We will also show results of similarity testing against malicious files (malwares). Data will be provided on the efficacy and scalability of this approach. We will conclude with a discussion of how this new methodology may be employed in a variety of computer security applications to improve the functionality and operation of a computer system. Examples may include whitelisting, overriding malware detection performed by a machine learning system, identifying corrupted legitimate files, and identifying new versions of legitimate files.
引用
收藏
页码:181 / 185
页数:5
相关论文
共 7 条
[1]  
IOPI, BORR MICR COD SIGN C
[2]  
Krebs B., 2013, Security Firm Bit9 Hacked, Used to Spread Malware
[3]  
Leskovec J., 2010, Mining of Massive Datasets
[4]  
Ni Y., 2017, DETECTING ABUSE SCAL
[5]  
Oliver J., SMART WHITELISTING U
[6]  
Oliver J, 2014, COMM COM INF SC, V490, P199
[7]   TLSH - A Locality Sensitive Hash [J].
Oliver, Jonathan ;
Cheng, Chun ;
Chen, Yanggui .
2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013), 2014, :7-13