You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis

被引:122
作者
Wang, Qi [1 ]
Ul Hassan, Wajih [1 ]
Li, Ding [2 ]
Jee, Kangkook [3 ]
Yu, Xiao [2 ]
Zou, Kexuan [1 ]
Rhee, Junghwan [2 ]
Chen, Zhengzhang [2 ]
Cheng, Wei [2 ]
Gunter, Carl A. [1 ]
Chen, Haifeng [2 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
[2] NEC Labs Amer Inc, Princeton, NJ USA
[3] Univ Texas Dallas, Richardson, TX 75083 USA
来源
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) | 2020年
关键词
D O I
10.14722/ndss.2020.24167
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To subvert recent advances in perimeter and host security, the attacker community has developed and employed various attack vectors to make a malware much stealthier than before to penetrate the target system and prolong its presence. Such advanced malware or "stealthy malware" makes use of various techniques to impersonate or abuse benign applications and legitimate system tools to minimize its footprints in the target system. It is thus difficult for traditional detection tools, such as malware scanners, to detect it, as the malware normally does not expose its malicious payload in a file and hides its malicious behaviors among the benign behaviors of the processes. In this paper, we present PROVDETECTOR, a provenancebased approach for detecting stealthy malware. Our insight behind the PROVDETECTOR approach is that although a stealthy malware attempts to blend into benign processes, its malicious behaviors inevitably interact with the underlying operating system (OS), which will be exposed to and captured by provenance monitoring. Based on this intuition, PROVDETECTOR first employs a novel selection algorithm to identify possibly malicious parts in the OS-level provenance data of a process. It then applies a neural embedding and machine learning pipeline to automatically detect any behavior that deviates significantly from normal behaviors. We evaluate our approach on a large provenance dataset from an enterprise network and demonstrate that it achieves very high detection performance of stealthy malware (an average Fl score of 0.974). Further, we conduct thorough interpretability studies to understand the internals of the learned machine learning models.
引用
收藏
页数:17
相关论文
共 108 条
[1]   Graph-based malware detection using dynamic analysis [J].
Anderson, Blake ;
Quist, Daniel ;
Neil, Joshua ;
Storlie, Curtis ;
Lane, Terran .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04) :247-258
[2]  
[Anonymous], 2019, VIRUSTOTAL REPORT
[3]  
[Anonymous], 2019, POWERSHELL EMPIRE
[4]  
[Anonymous], 2015, DEFENDING MALICIOUS
[5]  
[Anonymous], 2019, MICROSOFT INTERNET E
[6]  
[Anonymous], 2016, ATOMBOMBING BRAND NE
[7]  
[Anonymous], 2019, CUCKOO SANDBOX AUTOM
[8]  
[Anonymous], 2013, NIPS
[9]  
[Anonymous], 2019, Fitting an elliptic envelope
[10]  
[Anonymous], 2019, Novelty detection with local outlier factor