Peeler: Profiling Kernel-Level Events to Detect Ransomware

被引:19
作者
Ahmed, Muhammad Ejaz [1 ]
Kim, Hyoungshick [2 ]
Camtepe, Seyit [1 ]
Nepal, Surya [1 ]
机构
[1] Data61 CSIRO, Marsfield, NSW 2122, Australia
[2] Sungkyunkwan Univ, Suwon, South Korea
来源
COMPUTER SECURITY - ESORICS 2021, PT I | 2021年 / 12972卷
关键词
Fileless malware; Ransomware detection; Deep learning; Screen-locker; Malware behavior analysis; Machine learning;
D O I
10.1007/978-3-030-88418-5_12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Because the recent ransomware families are becoming progressively more advanced, it is challenging to detect ransomware using static features only. However, their behaviors are still more generic and universal to analyze due to their inherent goals and functions. Therefore, we can capture their behaviors by monitoring their system-level activities on files and processes. In this paper, we present a novel ransomware detection system called "Peeler" (Profiling kErnEl -Level Events to detect Ransomware). Peeler first identifies ransomware's inherent behavioral characteristics such as stealth operations performed during the attack, processes execution patterns, and correlations among different kernel-level events by analysing a large-scaled OS-level provenance data collected from a diverse set of ransomware families. Peeler specifically uses a novel NLP-based deep learning model to fingerprint the contextual behavior of applications by leveraging Bidirectional Encoder Representations from Transformers (BERT) pre-trained model. We evaluate Peeler on a large ransomware dataset including 67 ransomware families and demonstrate that it achieves a 99.5% F1-score.
引用
收藏
页码:240 / 260
页数:21
相关论文
共 27 条
[21]   Ransomware early detection by the analysis of file sharing traffic [J].
Morato, Daniel ;
Berrueta, Eduardo ;
Magana, Eduardo ;
Izal, Mikel .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 124 :14-32
[22]  
Nieuwenhuizen D, 2017, MWR Labs Whitepaper
[23]   CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data [J].
Scaife, Nolen ;
Carter, Henry ;
Traynor, Patrick ;
Butler, Kevin R. B. .
PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, :303-312
[24]   Countering Malicious Processes with Process-DNS Association [J].
Sivakorn, Suphannee ;
Jee, Kangkook ;
Sun, Yixin ;
Korts-Parn, Lauri ;
Li, Zhichun ;
Lumezanu, Cristian ;
Wu, Zhenyu ;
Tang, Lu-An ;
Li, Ding .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[25]   You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis [J].
Wang, Qi ;
Ul Hassan, Wajih ;
Li, Ding ;
Jee, Kangkook ;
Yu, Xiao ;
Zou, Kexuan ;
Rhee, Junghwan ;
Chen, Zhengzhang ;
Cheng, Wei ;
Gunter, Carl A. ;
Chen, Haifeng .
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
[26]  
WatchGuard, 2020, INT SEC REP Q4
[27]  
Zhao Lingxiao, 2019, ICLR