A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

被引:86
作者
Rudd, Ethan M. [1 ]
Rozsa, Andras [1 ]
Gunther, Manuel [1 ]
Boult, Terrance E. [1 ]
机构
[1] Univ Colorado, Dept Comp Sci, Vis & Secur Technol Lab, Colorado Springs, CO 80918 USA
基金
美国国家科学基金会;
关键词
Stealth; malware; rootkits; intrusion detection; machine learning; open set; recognition; anomaly detection; outlier detection; extreme value theory; novelty detection; INTRUSION DETECTION; ANOMALY DETECTION; NEURAL-NETWORKS; SUPPORT; FRAMEWORK; SYSTEMS; MODELS;
D O I
10.1109/COMST.2016.2636078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies, they present larger and more lucrative targets for malware. Stealth malware in particular poses an increased threat because it is specifically designed to evade detection mechanisms, spreading dormant, in the wild for extended periods of time, gathering sensitive information or positioning itself for a high-impact zero-day attack. Policing the growing attack surface requires the development of efficient anti-malware solutions with improved generalization to detect novel types of malware and resolve these occurrences with as little burden on human experts as possible. In this paper, we survey malicious stealth technologies as well as existing solutions for detecting and categorizing these countermeasures autonomously. While machine learning offers promising potential for increasingly autonomous solutions with improved generalization to new malware types, both at the network level and at the host level, our findings suggest that several flawed assumptions inherent to most recognition algorithms prevent a direct mapping between the stealth malware recognition problem and a machine learning solution. The most notable of these flawed assumptions is the closed world assumption: that no sample belonging to a class outside of a static training set will appear at query time. We present a formalized adaptive open world framework for stealth malware recognition and relate it mathematically to research from other machine learning domains.
引用
收藏
页码:1145 / 1172
页数:28
相关论文
共 167 条
[1]  
Abou-Assaleh T, 2004, P INT COMP SOFTW APP, P41
[2]  
Aggarwal CC., 2007, DATA STREAMS ADV DAT
[3]  
Ahmad I, 2011, INT PROC COMPUT SCI, V5, P75
[4]   RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks [J].
Amini, Morteza ;
Jalili, Rasool ;
Shahriari, Hamid Reza .
COMPUTERS & SECURITY, 2006, 25 (06) :459-468
[5]  
Nguyen A, 2015, PROC CVPR IEEE, P427, DOI 10.1109/CVPR.2015.7298640
[6]  
[Anonymous], OLMASCO BOOTKIT NEXT
[7]  
[Anonymous], THOUGHTS ABOUT CROSS
[8]  
[Anonymous], THESIS
[9]  
[Anonymous], SONYS DRM ROOTKIT RE
[10]  
[Anonymous], TECH REP