Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

1. A Discrete Event System Based Approach for Obfuscated Malware Detection

verfasst von : Chinmaya K. Patanaik, Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi

Erschienen in: Advances in Communication and Computing

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the growing use and popularity of Internet among people, security threats such as viruses, worms etc., are also rapidly increasing. In order to detectand prevent such threats, many antivirus softwares have been created. Signature matching approach used to detect malwares can be easily thwarted by using code obfuscation techniques. In this paper, we propose a discrete event systems-based approach to detect obfuscated malwares in a system, taking Bagle. A as our test virus. Commonly used obfuscation techniques have been applied to bagle. We built DES models for a process under attack and normal conditions with system calls as events. Based on the system calls evoked by any process, our detector will determine its maliciousness by comparing it with both the models.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Szr, P., Ferrie, P.: Hunting for metamorphic. In: Virus Bulletin Conference, pp. 123–144 (2001) Szr, P., Ferrie, P.: Hunting for metamorphic. In: Virus Bulletin Conference, pp. 123–144 (2001)
3.
Zurück zum Zitat Dingel, J., Rudie, K., Dragert, C.: Bridging the gap: discrete-event systems for software engineering (short position paper). In: Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering, series C3S2E’09, pp. 67–71. New York, NY, USA: ACM (2009) [Online]. Available: http://doi.acm.org/10.1145/1557626.1557637 Dingel, J., Rudie, K., Dragert, C.: Bridging the gap: discrete-event systems for software engineering (short position paper). In: Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering, series C3S2E’09, pp. 67–71. New York, NY, USA: ACM (2009) [Online]. Available: http://​doi.​acm.​org/​10.​1145/​1557626.​1557637
4.
Zurück zum Zitat Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, pp. 169–186 (2003) Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, pp. 169–186 (2003)
6.
Zurück zum Zitat Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy, pp. 32–46 (2005) Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy, pp. 32–46 (2005)
7.
Zurück zum Zitat Kolbitsch, C., Comparetti, P.M., Kruegel, C., Kirda, E., Zhou, X., Wang, X.: Effective and efficient malware detection at the end host Kolbitsch, C., Comparetti, P.M., Kruegel, C., Kirda, E., Zhou, X., Wang, X.: Effective and efficient malware detection at the end host
8.
Zurück zum Zitat Neminath, H., Biswas, S., Roopa, S., Ratti, R., Nandi, S., Barbhuiya, F., Sur, A., Ramachandran, V.: A des approach to intrusion detection system for ARP spoofing attacks. In: 2010 18th Mediterranean Conference on Control Automation (MED), June 2010, pp. 695–700 Neminath, H., Biswas, S., Roopa, S., Ratti, R., Nandi, S., Barbhuiya, F., Sur, A., Ramachandran, V.: A des approach to intrusion detection system for ARP spoofing attacks. In: 2010 18th Mediterranean Conference on Control Automation (MED), June 2010, pp. 695–700
9.
Zurück zum Zitat Lakhotia, A., Kumar, E.U.: Abstract stack graph to detect obfuscated calls in binaries. In: Proceedings 4th IEEE International Workshop on Source Code Analysis and Manipulation, pp. 17–26, IEEE Computer Society (2004) Lakhotia, A., Kumar, E.U.: Abstract stack graph to detect obfuscated calls in binaries. In: Proceedings 4th IEEE International Workshop on Source Code Analysis and Manipulation, pp. 17–26, IEEE Computer Society (2004)
10.
Zurück zum Zitat You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), november, pp. 297–300 (2010) You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), november, pp. 297–300 (2010)
11.
Zurück zum Zitat Rozinov, K.: Reverse code engineering: an in-depth analysis of the bagle virus. Technical Report, Bell Labs (2004) Rozinov, K.: Reverse code engineering: an in-depth analysis of the bagle virus. Technical Report, Bell Labs (2004)
13.
Zurück zum Zitat Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 5–14 (2007) Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 5–14 (2007)
Metadaten
Titel
A Discrete Event System Based Approach for Obfuscated Malware Detection
verfasst von
Chinmaya K. Patanaik
Ferdous A. Barbhuiya
Santosh Biswas
Sukumar Nandi
Copyright-Jahr
2015
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2464-8_1

Neuer Inhalt