Insights gained from constructing a large scale dynamic analysis platform

被引:10
作者
Miller, Cody [1 ]
Glendowne, Dae [2 ]
Cook, Henry [3 ]
Thomas, DeMarcus [2 ]
Lanclos, Chris [2 ]
Pape, Patrick [2 ]
机构
[1] Babel St,1818 Lib St, Reston, VA USA
[2] Distributed Analyt & Secur Inst, 2 Res Blvd, Starkville, MS USA
[3] Green Mt Technol, 5860 Ridgeway Ctr Pkwy,Suite 401, Memphis, TN USA
关键词
Malware; Dynamic analysis; Cuckoo sandbox;
D O I
10.1016/j.diin.2017.06.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of malware samples found increases exponentially each year, there is a need for systems that can dynamically analyze thousands of malware samples per day. These systems should be reliable, scalable, and simple to use by other systems and malware analysts. When handling thousands of malware, reprocessing a small percentage of the malware due to errors can be devastating; a reliable system avoids wasting resources by reducing the number of errors. In this paper, we describe our scalable dynamic analysis platform, perform experiments on the platform, and provide lessons we have learned through the process. The platform uses Cuckoo sandbox for dynamic analysis and is improved to process malware as quickly as possible without losing valuable information. Experiments were performed to improve the configuration of the system's components and help improve the accuracy of the dynamic analysis. Lessons learned presented in the paper may aid others in the development of similar dynamic analysis systems. (C) 2017 The Author(s). Published by Elsevier Ltd. on behalf of DFRWS.
引用
收藏
页码:S48 / S56
页数:9
相关论文
共 27 条
[21]  
Vasudevan A., 2004, HAW INT C COMP SCI
[22]  
Vasudevan A., 2005, COMP SEC APPL C 21 A, P10
[23]   Cobra: Fine-grained malware analysis using stealth localized-executions [J].
Vasudevan, Amit ;
Yerraballi, Ramesh .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :264-+
[24]  
Willems C., SANDBOX EVASION TE 2
[25]   Toward automated dynamic malware analysis using CWSandbox [J].
Willems, Carsten ;
Holz, Thorsten ;
Freiling, Felix .
IEEE SECURITY & PRIVACY, 2007, 5 (02) :32-39
[26]  
Wojtczuk R., TECH REP
[27]  
Yin H, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P116