CISC 879 - Machine Learning for Solving Systems Problems Presented by: Suparna Manjunath Dept of Computer & Information Sciences University of Delaware.

Slides:



Advertisements
Similar presentations
Mobile Viruses and Worms (Project Group 6) Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao.
Advertisements

Operating System Structures
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
1 Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code (DOME) Subha Ramanathan & Arun Krishnamurthy Nov 15, 2005.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
NaLIX: A Generic Natural Language Search Environment for XML Data Presented by: Erik Mathisen 02/12/2008.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
1 Software Testing and Quality Assurance Lecture 30 – Testing Systems.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps Bin Liu (SRA), Bin Liu (CMU), Hongxia Jin (SRA), Ramesh Govindan (USC)
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Automated malware classification based on network behavior
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
A Hybrid Model to Detect Malicious Executables Mohammad M. Masud Latifur Khan Bhavani Thuraisingham Department of Computer Science The University of Texas.
CISC Machine Learning for Solving Systems Problems Presented by: Akanksha Kaul Dept of Computer & Information Sciences University of Delaware SBMDS:
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 3 Controlling Files. Chapter 3 Overview The file system and file access rights Executable files Computer viruses and malware Policies for file.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Seminar On Cellular Virus
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
Honeypot and Intrusion Detection System
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Software.
Android for Java Developers Denver Java Users Group Jan 11, Mike
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
AccessMiner Using System- Centric Models for Malware Protection Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu and Engin Kirda.
Behavioral Detection of Malware on Mobile Handsets Abhijit Bose IBM TJ Watson Research Xin Hu University of Michigan Kang G. Shin University of Michigan.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
CISC Machine Learning for Solving Systems Problems Presented by: Alparslan SARI Dept of Computer & Information Sciences University of Delaware
Biologically Inspired Defenses against Computer Viruses International Joint Conference on Artificial Intelligence 95’ J.O. Kephart et al.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Chapter 8 Object Design Reuse and Patterns. Object Design Object design is the process of adding details to the requirements analysis and making implementation.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
CISC Machine Learning for Solving Systems Problems Presented by: Sandeep Dept of Computer & Information Sciences University of Delaware Detection.
CISC Machine Learning for Solving Systems Problems Presented by: Ashwani Rao Dept of Computer & Information Sciences University of Delaware Learning.
CISC Machine Learning for Solving Systems Problems Presented by: Satyajeet Dept of Computer & Information Sciences University of Delaware Automatic.
CISC Machine Learning for Solving Systems Problems Presented by: Suman Chander B Dept of Computer & Information Sciences University of Delaware Automatic.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Lecture 18 Windows – NT File System (NTFS)
Malicious Software.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Intro to Web Services Dr. John P. Abraham UTPA. What are Web Services? Applications execute across multiple computers on a network.  The machine on which.
Chapter 1 Basic Concepts of Operating Systems Introduction Software A program is a sequence of instructions that enables the computer to carry.
VMM Based Rootkit Detection on Android
A Blackboard-Based Learning Intrusion Detection System: A New Approach
1 3 Computing System Fundamentals 3.7 Utility Software.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Unveiling Zeus Automated Classification of Malware Samples Abedelaziz Mohaisen Omar Alrawi Verisign Inc, VA, USA Verisign Labs, VA, USA
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
October 20-23rd, 2015 FEEBO: A Framework for Empirical Evaluation of Malware Detection Resilience Against Behavior Obfuscation Sebastian Banescu Tobias.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Free for All! Assessing User Data Exposure to Advertising Libraries on Android Campbell Foskin.
Self Healing and Dynamic Construction Framework:
Seminar On Cellular Virus
Techniques, Tools, and Research Issues
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

CISC Machine Learning for Solving Systems Problems Presented by: Suparna Manjunath Dept of Computer & Information Sciences University of Delaware Behavioral Detection of Malware on Mobile Handsets Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park

CISC Machine Learning for Solving Systems Problems Malware on Mobile Handsets  Like PC’s Mobile Handsets are becoming more intelligent and complex in functionality  Exposure to malicious programs and risks increase with the new capabilities of handsets  Cabir, the first mobile worm appeared in June 2004  WinCE.Duts, the Windows CE virus was the first file injector on mobile handsets capable of infecting all the executables in the device’s root directory

CISC Machine Learning for Solving Systems Problems  Rely primarily on signature-based detection  Useful mostly for post-infection cleanup  Example: Scan the system directory for the presence of files with specific extension.APP,.RSC and.MLD in Symbian-based devices  Due to differences between mobile and traditional desktop environments Limitations of current anti-virus solutions for mobile devices

CISC Machine Learning for Solving Systems Problems Why conventional anti-virus solutions are less efficient for mobile devices?  Mobile devices generally have limited resources such as CPU, memory, and battery power  Most published studies on the detection of internet malware focus on their network signatures  Mobile OSes have important differences in the way file permissions and modifications to the OS are handled

CISC Machine Learning for Solving Systems Problems Goal Develop a detection framework that  Overcomes the limitations of signature based detection  Address the unique features and constraints of mobile handsets

CISC Machine Learning for Solving Systems Problems Approach Behavioral detection approach is used to detect malware on mobile handsets

CISC Machine Learning for Solving Systems Problems Behavioral Detection  Run-time behavior of an application is monitored and compared against malicious and/or normal behavior profiles  More resilient to polymorphic worms and code obfuscation  Database of behavior profiles is much smaller than that needed for storing signature-based profiles  Suitable for resource limited handsets  Has potential for detecting new malware

CISC Machine Learning for Solving Systems Problems System Overview

CISC Machine Learning for Solving Systems Problems Malicious Behavior Signatures  Behavior Signature: Manifestation of a specification of resource accesses and events generated by applications  It is not sufficient to monitor a single event of a process in isolation in order to classify an activity to be malicious  Temporal Pattern: The precedence order of the events and resource accesses, is the key to detect malicious intent

CISC Machine Learning for Solving Systems Problems Temporal Patterns - Example  Consider a simple file transfer by calling the Bluetooth OBEX system call in Symbian OS  On their own, any such call will appear harmless  Temporal Pattern: (received file is of type.SIS) and (that file is executed later) and (installer process seeks to overwrite files in the system directory)

CISC Machine Learning for Solving Systems Problems Representation of Malicious Behavior  Simple Behavior: ordering the corresponding actions using a vector clock and applying the “and” operator to the actions  Complex Behavior: specified using temporal logic instead of classical propositional logic  Specification language of TLCK(Temporal Logic of Causal Knowledge) is used to represent malicious behaviors within the context of a handset environment

CISC Machine Learning for Solving Systems Problems Behavior Signature  A finite set of propositional variables interposed using TLCK  Each variable (when true) confirms the execution of either - A single or an aggregation of system calls - An event such as read/write access to a given file descriptor, directory structure or memory location  PS = {p1, p2, ・ ・ ・, pm} U {i|i ∈ N}

CISC Machine Learning for Solving Systems Problems Operators used to define Malicious Behavior Logical Operators: Temporal Operators:

CISC Machine Learning for Solving Systems Problems Example: Commwarrior Worm – Behavior Signature

CISC Machine Learning for Solving Systems Problems Atomic Propositional Variables

CISC Machine Learning for Solving Systems Problems Higher Level Signatures Harmless Signatures: Harmful Signatures:

CISC Machine Learning for Solving Systems Problems Generalized Behavior Signatures  Studied more than 25 distinct families of mobile viruses and worms targeting the Symbian OS  Extracted most common signature elements and a database was created  Malware actions were placed were placed into 3 categories: - User Data Integrity - System Data Integrity - Trojan-like Actions

CISC Machine Learning for Solving Systems Problems Run-Time Construction of Behavior Signatures Proxy DLL to capture API call arguments

CISC Machine Learning for Solving Systems Problems Major Components of Monitoring System

CISC Machine Learning for Solving Systems Problems Behavior Classification By Machine Learning Algorithm  Behavior signatures for the complete life cycle of malware are placed in the behavior database for run-time classification  To activate early response mechanisms, malicious behavior database must also contain partial signatures that have a high probability of eventually manifesting as malicious behavior  Behavior detection system can detect even new malware or variants of existing malware, whose behavior is only partially matched with the signatures in the database  SVM is used to classify partial behavior signatures from the training data of both normal and malicious applications

CISC Machine Learning for Solving Systems Problems Possible Evasions Program behavior can be obfuscated by:  Behavior reordering  File or directory renaming  Normal behavior insertion  Equivalent behavior replacement

CISC Machine Learning for Solving Systems Problems Limitations  The detection might fail if most behaviors of a mobile malware are completely new or the same as normal programs  The system can be circumvented by malware that can bypass the API monitoring or modify the framework configuration

CISC Machine Learning for Solving Systems Problems Evaluation  Monitor agent (platform dependent) and Behavior detection agent (platform independent) is evaluated  Program behavior is emulated and then tested against real-world worms  5 malware applications (Cabir, Mabir, Lasco, Commwarrior, and a generic worm that spreads by sending messages via MMS and Bluetooth) and 3 legitimate applications (Bluetooth OBEX file transfer, MMS client, and the MakeSIS utility in Symbian OS) were built Applications (Malwre + Legitimate) Set of Behavior Signatures Obtain Partial/ Full Signatures Remove Redundant Signatures Training Dataset Testing Dataset

CISC Machine Learning for Solving Systems Problems Classification Accuracy of Known Worms

CISC Machine Learning for Solving Systems Problems Detection Accuracy (%) of Unknown Worms

CISC Machine Learning for Solving Systems Problems Evaluation with Real-world Mobile Worms  Two Symbian worms, Cabir and Lasco are considered  Behavior signatures are collected by compiling and running them on Symbian emulator - SVC achieved 100% detection of all worm instances  Framework’s resilience to the variations and obfuscation is tested by considering the variants of Cabir - The variants are easily detectable as the behavioral detection abstracts away the name details

CISC Machine Learning for Solving Systems Problems Conclusions  Due to fewer signatures, the malware database is compact and can be place on a handset  Can potentially detect new malware and their variants  Behavioral detection results in high detection rates

CISC Machine Learning for Solving Systems Problems Thank You