Real-Time RAT-based APT Detection

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

By Hiranmayi Pai Neeraj Jain
Automated Web Patrol with Strider Honey Monkeys: Finding Web Sites That Exploit Browser Vulnerabilities AUTHORS: Yi-Min Wang, Doug Beck, Xuxian Jiang,
Fast and Precise In-Browser JavaScript Malware Detection
Linear Obfuscation to Combat Symbolic Execution Zhi Wang 1, Jiang Ming 2, Chunfu Jia 1 and Debin Gao 3 1 Nankai University 2 Pennsylvania State University.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Jarhead Analysis and Detection of Malicious Java Applets Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna University of California Annual Computer.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Introduction to InfoSec – Recitation 15 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
John P., Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy University of California, Santa Cruz USENIX SECURITY SYMPOSIUM, August, 2010 John P.,
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Nemesysco’s SCA1 Automated “Emotional content” & Veracity call analyzer for multi- channel recording systems Targeted at government intelligence and Law.
Automated Classification and Analysis of Internet Malware M. Bailey J. Oberheide J. Andersen Z. M. Mao F. Jahanian J. Nazario RAID 2007 Presented by Mike.
Identification of Bot Commands By Run-time Execution Monitoring Younghee Park, Douglas S. Reeves North Carolina State University ACSAC
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Ensemble Learning for Low-level Hardware-supported Malware Detection
Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John Mitchell RAID
Zozzle: Low-overhead Mostly Static JavaScript Malware Detection.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
UC Marco Vieira University of Coimbra
Date of download: 7/8/2016 Copyright © 2016 SPIE. All rights reserved. A scalable platform for learning and evaluating a real-time vehicle detection system.
APTShield: A Fine-grained Detection System for Remote Access Trojan in the APT Attacks Yan Chen.
APTShield: A Real-Time Situation-Aware Detection System for Remote Access Trojan in the APT Attacks Yan Chen.
Learning to Detect and Classify Malicious Executables in the Wild by J
Internet Quarantine: Requirements for Containing Self-Propagating Code
CSCE 548 Secure Software Development Risk-Based Security Testing
Presentation by: Naga Sri Charan Pendyala
Real-Time RAT-based APT Detection
Implementing Cisco Cybersecurity Operations
Machine Learning for Enterprise Security
Malware Detection XUTONG CHEN & Xin zhou.
A lustrum of malware network communication: Evolution & insights
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Modeling Adversarial Activity (MAA)
Conquering all phases of the attack lifecycle
Outline Introduction Characteristics of intrusion detection systems
TriggerScope Towards Detecting Logic Bombs in Android Applications
Cybersecurity EXERCISE (CE) ATD Scenario intro
ADVANCED PERSISTENT THREATS (APTs) - Simulation
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Panel Discussion Can We Handle an Advanced Cyber Threat?
Cyber defense management
Real-Time RAT-based APT Detection
DIBELS Next Overview.
Xutong Chen and Yan Chen
Semantics-Aware Malware Detection
Yan Chen Detecting Missing RAT Attacks with Semantics on Windows
Detecting Insider Information Theft Using Features from File Access Logs Every action, on your phone, on your computer, online, has some risk associated.
Four Generations of Security Devices Putting IDS in Context
Intrusion Prevention Systems
APTShield: Real-time RAT-based Detection for Engagement 2
RHMD: Evasion-Resilient Hardware Malware Detectors
Software Verification and Validation
Cybersecurity ATD Scenario conclusion
Software Verification and Validation
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Motivation and Problem Statement
Autonomous Network Alerting Systems and Programmable Networks
Statistical based IDS background introduction
Introduction to Internet Worm
Modeling IDS using hybrid intelligent systems
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

Real-Time RAT-based APT Detection

High Value Asset Acquisition Our Focus Initial Compromise Gaining Foothold Lateral Movement High Value Asset Acquisition Malware (e.g. RAT) Phishing Exploit vulnerability Victim Network scan Attacker Code Repo Malware propagation CONFIDENTIAL Malicious Web Database Exploit browser Behavior based Malware detection Design a detection mechanism that targets at the post-compromise steps in the APT life- cycle

APT Malware Remote Access Trojan (RAT) Based on the study of 300+ APT whitepapers, RAT is a core component in an APT attack, and >90% are Windows based. Allows an adversary to remotely control a system Consists of a complex set of potentially harmful functions (PHFs) E.g., keylogger, screengrab, remote shell, audiograb A Windows RAT typically embodies10~40 PHFs.

Previous Malware Detection Methods would Fail RAT Detection Major problems Detection based on the coarse-grained dynamic behavior of a malware. Would fail if a malware performs a part or other behaviors not used for training Do not understand the semantics of the malwares. Existing behavior-based signature graph Our approach PHF1&PHF2 => signature graph. When PHF1 is triggered, it cannot be matched since the two green ancestor node are not matched/activated. In figure 1, the previous method has to match either red triangle or blue triangle to reach an interesting point so that it can detect PHF1 or PHF2. Our approach will divide them into 2 sequences and easily detect it. exhausts all key functionalities contained in a RAT generates finer-grained, per functionality detector Able to untangle the whole behavior graph

Basic Idea Observations # of PHFs possibly embodied in a RAT is limited (10~40). Ways of implementing a PHF are limited too, in terms of Core system calls & parameters , and such sequences to exactly define a PHF  Possible to define each PHF using system call sequences Propose PHF-based RAT detection when a program exhibits A sufficient number of PHFs RAT-specific resource access characteristics function-level, ground truth, supervised training,  is a must for adversaries to implement a PHF A PHF could be exactly defined by a limited set of core system calls. Separation of signatures for PHFs increases the detection specificity by combining different types of signatures In each signature sequence, the core system calls are irreplaceable, and the order must be preserved to implement a p Advantages: evasion-resilient and semantic-aware Hard to evade unless attackers find new ways of implementing PHFs Per PHF detector; semantic-aware; know exactly what activity is going on

Approach Design Supervised learning Training data with ground truth … PHF1 Trace 1 PHF1 Trace 2 … PHF1 Trace n Self-repeated gadgets identification and correlation analysis A PHF1 Signatures for each PHF, for determining the functionality B C RAT traces … … Module 1: Traces based signature generation system (offline) PHFmTrace 1 PHFmTrace 2 … PHFm Trace n PHFm U Gadgets identification and correlation analysis V W Feature generation & selection Classifier signatures for differentiating benign from malicious Benign traces function-level, ground truth, supervised training Generated signatures for both determining the functionality and discerning between malicious and benign Characteristic analysis Supervised learning Signature matching PHF1 Detector Score 1 Module 2: Real-time RAT detection system System call traces NtGdiCreateCompatibleDC NtGdiBitBlt NtCreateSection NtQueryInformationProcess NtCreateThread NtResumeThread PHF2 Detector Score 2 Malicious Score … … PHFn-1 Detector Score n-1 Classifier Detector Score n

Perform well on FAROS Stretch Goal (the only data available) Detection Results Perform well on FAROS Stretch Goal (the only data available) 71,343,906 records in total; 35,650,758 system call events 20 mins processing time, with the throughput of 3,567,195 records/min Our system detected three processes. Specifically, Profile.exe (2) matched with the remote shell detector Prodat.exe matched with the screen grab detector Then applying backtracking with these 3 processes identified all 22 attack processes in the traces (4% out of 529 total processes). Obtain good accuracy on other benign and malicious traces. No false positive for 50+ popular Windows applications (Browsers with download and execution operations; email reader; Skype and Pidgin in conversation) Detected all obfuscated RAT traces and simulated injection attack traces Data #Records #System call events I/O(mins) Analysis(mins) Throughput(records/min) Stretch 71,343,906 35,650,758 11 20 3,567,195 FAROS stretch dataset contains about 71 million records, about half of which are system call event records. It took our system about 30 minutes to process all of them. Specically, 11 minutes were spent on I/O and 20 minutes on the real analysis part. The throughput of our system is about 3.5 million records per minute.