Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

被引:25
作者
Kumara, Ajay M. A. [1 ]
Jaidhar, C. D. [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Informat Technol, Surathkal, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 79卷
关键词
Cyber-Physical system; Hypervisor; Feature selection technique; Machine learning; Memory forensic analysis; N-gram feature extraction; Virtual machine introspection; CYBER-PHYSICAL SYSTEMS; MALICIOUS EXECUTABLES; COMPUTER; CLASSIFICATION; INFORMATION; LIVE;
D O I
10.1016/j.future.2017.06.002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to fulfill the requirements like stringent timing restraints and demand on resources, Cyber-Physical System (CPS) must deploy on the virtualized environment such as cloud computing. To protect Virtual Machines (VMs) in which CPSs are functioning against malware-based attacks, malware detection and mitigation technique is emerging as a highly crucial concern. The traditional VM-based anti-malware software themselves a potential target for malware-based attack since they are easily subverted by sophisticated malware. Thus, a reliable and robust malware monitoring and detection systems are needed to detect and mitigate rapidly the malware based cyber-attacks in real time particularly for virtualized environment. The Virtual Machine Introspection (VMI) has emerged as a fine-grained out-of-VM security solution to detect malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS) by functioning at the Virtual Machine Monitor (VMM) or hypervisor. However, the reconstructed semantic details by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, extensive manual analysis is required by the existing out-of-VM security solutions. To address the foremost issue, in this paper, we propose an advanced VMM-based guest-assisted Automated Multilevel Malware Detection System (AMMDS) that leverages both VMI and Memory Forensic Analysis (MFA) techniques to predict early symptoms of malware execution by detecting stealthy hidden processes on a live guest OS. More specifically, the AMMDS system detects and classifies the actual running malicious executables from the semantically reconstructed process view of the guest OS. The two sub-components of the AMMDS are: Online Malware Detector (OMD) and Offline Malware Classifier (OFMC). The OMD recognizes whether the running processes are benign or malicious using its Local Malware Signature Database (LMSD) and online malware scanner and the OFMC classify unknown malware by adopting machine learning techniques at the hypervisor. The AMMDS has been evaluated by executing large real-world malware and benign executables on to the live guest OSs. The evaluation results achieved 100% of accuracy and zero False Positive Rate (FPR) on the 10-fold cross-validation in classifying unknown malware with maximum performance overhead of 5.8%. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:431 / 446
页数:16
相关论文
共 79 条
  • [1] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
    Ahmadi, Mansour
    Ulyanov, Dmitry
    Semenov, Stanislav
    Trofimov, Mikhail
    Giacinto, Giorgio
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 183 - 194
  • [2] [Anonymous], 2009, SIGKDD Explorations, DOI DOI 10.1145/1656274.1656278
  • [3] [Anonymous], 2003, P NETW DISTR SYST SE
  • [4] Improving malware detection using multi-view ensemble learning
    Bai, Jinrong
    Wang, Junfeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4227 - 4241
  • [5] Bayer U., 2009, A view on current malware behaviors
  • [6] Carbone Martim, 2012, Research in Attacks, Intrusions, and Defenses. Proceedings of the 15th International Symposium, RAID 2012, P22, DOI 10.1007/978-3-642-33338-5_2
  • [7] Dynamic recreation of kernel data structures for live forensics
    Case, Andrew
    Marziale, Lodovico
    Richard, Golden G., III
    [J]. DIGITAL INVESTIGATION, 2010, 7 : S32 - S40
  • [8] Cyber-physical systems clouds: A survey
    Chaari, Rihab
    Ellouze, Fatma
    Koubaa, Anis
    Qureshi, Basit
    Pereira, Nuno
    Youssef, Habib
    Tovar, Eduardo
    [J]. COMPUTER NETWORKS, 2016, 108 : 260 - 278
  • [9] A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures
    Chen, Zhijiang
    Xu, Guobin
    Mahalingam, Vivek
    Ge, Linqiang
    James Nguyen
    Yu, Wei
    Lu, Chao
    [J]. BIG DATA RESEARCH, 2016, 3 : 10 - 23
  • [10] Cheng Y., 2016, INFORM SCI