Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

被引:25
作者
Kumara, Ajay M. A. [1 ]
Jaidhar, C. D. [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Informat Technol, Surathkal, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 79卷
关键词
Cyber-Physical system; Hypervisor; Feature selection technique; Machine learning; Memory forensic analysis; N-gram feature extraction; Virtual machine introspection; CYBER-PHYSICAL SYSTEMS; MALICIOUS EXECUTABLES; COMPUTER; CLASSIFICATION; INFORMATION; LIVE;
D O I
10.1016/j.future.2017.06.002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to fulfill the requirements like stringent timing restraints and demand on resources, Cyber-Physical System (CPS) must deploy on the virtualized environment such as cloud computing. To protect Virtual Machines (VMs) in which CPSs are functioning against malware-based attacks, malware detection and mitigation technique is emerging as a highly crucial concern. The traditional VM-based anti-malware software themselves a potential target for malware-based attack since they are easily subverted by sophisticated malware. Thus, a reliable and robust malware monitoring and detection systems are needed to detect and mitigate rapidly the malware based cyber-attacks in real time particularly for virtualized environment. The Virtual Machine Introspection (VMI) has emerged as a fine-grained out-of-VM security solution to detect malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS) by functioning at the Virtual Machine Monitor (VMM) or hypervisor. However, the reconstructed semantic details by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, extensive manual analysis is required by the existing out-of-VM security solutions. To address the foremost issue, in this paper, we propose an advanced VMM-based guest-assisted Automated Multilevel Malware Detection System (AMMDS) that leverages both VMI and Memory Forensic Analysis (MFA) techniques to predict early symptoms of malware execution by detecting stealthy hidden processes on a live guest OS. More specifically, the AMMDS system detects and classifies the actual running malicious executables from the semantically reconstructed process view of the guest OS. The two sub-components of the AMMDS are: Online Malware Detector (OMD) and Offline Malware Classifier (OFMC). The OMD recognizes whether the running processes are benign or malicious using its Local Malware Signature Database (LMSD) and online malware scanner and the OFMC classify unknown malware by adopting machine learning techniques at the hypervisor. The AMMDS has been evaluated by executing large real-world malware and benign executables on to the live guest OSs. The evaluation results achieved 100% of accuracy and zero False Positive Rate (FPR) on the 10-fold cross-validation in classifying unknown malware with maximum performance overhead of 5.8%. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:431 / 446
页数:16
相关论文
共 79 条
  • [61] Data mining methods for detection of new malicious executables
    Schultz, MG
    Eskin, E
    Zadok, E
    Stolfo, SJ
    [J]. 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 38 - 49
  • [62] Shabtai A., 2012, Security Informatics, V1, P1, DOI DOI 10.1186/2190-8532-1-1
  • [63] Shafiq MZ, 2009, LECT NOTES COMPUT SC, V5758, P121, DOI 10.1007/978-3-642-04342-0_7
  • [64] In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
    Shahzad, Farrukh
    Shahzad, M.
    Farooq, Muddassar
    [J]. INFORMATION SCIENCES, 2013, 231 : 45 - 63
  • [65] Growing Grapes in Your Computer to Defend Against Malware
    Shan, Zhiyong
    Wang, Xin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (02) : 196 - 207
  • [66] Sharif M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P477
  • [67] Automatic Reverse Engineering of Malware Emulators
    Sharif, Monirul
    Lanzi, Andrea
    Giffin, Jonathon
    Lee, Wenke
    [J]. PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 94 - 109
  • [68] SHEVCHENKO A, 2007, EVOLUTION SELF DEFEN
  • [69] Srinivasan D, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P363
  • [70] Anti-forensic resilient memory acquisition
    Stuettgen, Johannes
    Cohen, Michael
    [J]. DIGITAL INVESTIGATION, 2013, 10 : S105 - S115