skip to main content
10.1145/2808769.2808773acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Malicious Behavior Detection using Windows Audit Logs

Published:16 October 2015Publication History

ABSTRACT

As antivirus and network intrusion detection systems have increasingly proven insufficient to detect advanced threats, large security operations centers have moved to deploy endpoint-based sensors that provide deeper visibility into low-level events across their enterprises. Unfortunately, for many organizations in government and industry, the installation, maintenance, and resource requirements of these newer solutions pose barriers to adoption and are perceived as risks to organizations' missions. To mitigate this problem we investigated the utility of agentless detection of malicious endpoint behavior, using only the standard built-in Windows audit logging facility as our signal. We found that Windows audit logs, while emitting manageable sized data streams on the endpoints, provide enough information to allow robust detection of malicious behavior. Audit logs provide an effective, low-cost alternative to deploying additional expensive agent-based breach detection systems in many government and industrial settings, and can be used to detect, in our tests, 83% percent of malware samples with a 0.1% false positive rate. They can also supplement already existing host signature-based antivirus solutions, like Kaspersky, Symantec, and McAfee, detecting, in our testing environment, 78% of malware missed by those antivirus systems.

References

  1. Anubis. https://anubis.iseclab.org/.Google ScholarGoogle Scholar
  2. Cuckoo Sandbox. http://www.cuckoosandbox.org.Google ScholarGoogle Scholar
  3. VirtualBox. https://www.virustotal.com.Google ScholarGoogle Scholar
  4. VirusTotal. hhttps://www.virtualbox.org.Google ScholarGoogle Scholar
  5. Description of security events in Windows Vista and in Windows Server 2008. https://support.microsoft.com/en-us/kb/947226, January 2009.Google ScholarGoogle Scholar
  6. Visual basic platform is becoming increasingly popular among malware writers. http://www.lavasoft.com/mylavasoft/securitycenter/whitepapers/visual-basic-platform-is-becoming-increasingly-popular-among-malware, September 2012.Google ScholarGoogle Scholar
  7. Does malware still detect virtual machines? http://www.symantec.com/connect/blogs/does-malware-still-detect-virtual-machines, August 2014.Google ScholarGoogle Scholar
  8. File detection test of malicious software. http://www.av-comparatives.org/wp-content/uploads/2015/04/avc_fdt_201503_en.pdf, April 2015.Google ScholarGoogle Scholar
  9. B. Anderson, D. Quist, J. Neil, C. Storlie, and T. Lane. Graph-based malware detection using dynamic analysis. Journal in Computer Virology, 7(4):247--258, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. D. Bowers, C. Hart, A. Juels, and N. Triandopoulos. Pillarbox: Combating next-generation malware with fast forward-secure logging. In Research in Attacks, Intrusions and Defenses, pages 46--67. Springer, 2014.Google ScholarGoogle Scholar
  11. M. Chandramohan, H. B. K. Tan, and L. K. Shar. Scalable malware clustering through coarse-grained behavior modeling. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, pages 27:1--27:4. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Dai, R. Guha, and J. Lee. Efficient virus detection using dynamic instruction sequences. Journal of Computers, 4(5):405--414, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  13. M. Egele, T. Scholte, E. Kirda, and C. Kruegel. A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys, 44(2):6, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems, 32(2):5:1--5:29, June 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Fleck, A. Tokhtabayev, A. Alarif, A. Stavrou, and T. Nykodym. Pytrigger: A system to trigger & extract user-activated malware behavior. In Proceedings of the 2013 International Conference on Availability, Reliability and Security, pages 92--101. IEEE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. H. Friedman, T. Hastie, and R. Tibshirani. Regularization paths for generalized linear models via coordinate descent. Journal of Statistical Software, 33(1):1--22, 2 2010.Google ScholarGoogle Scholar
  17. E. Gandotra, D. Bansal, and S. Sofat. Malware analysis and classification: A survey. Journal of Information Security, 5(02):56, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  18. S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151--180, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. W. Lee and S. J. Stolfo. Data mining approaches for intrusion detection. In Usenix Security, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Ma and G. Tsudik. A new approach to secure logging. ACM Transactions on Storage, 5(1):2:1--2:21, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Mohaisen and O. Alrawi. AV-meter: An evaluation of antivirus scans and labels. In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 112--131. Springer, 2014.Google ScholarGoogle Scholar
  23. A. Mohaisen, O. Alrawi, and M. Mohaisen. Amal: High-fidelity, behavior-based automated malware analysis and classification. Computers & Security, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  24. A. Moser, C. Kruegel, and E. Kirda. Limits of static analysis for malware detection. In Proceedings of the 23rd Computer Security Applications Conference, pages 421--430, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  25. J. Qian, T. Hastie, J. Friedman, R. Tibshirani, and N. Simon. Glmnet for MATLAB. http://www.stanford.edu/~hastie/glmnet_matlab, 2013.Google ScholarGoogle Scholar
  26. N. Runwal, R. M. Low, and M. Stamp. Opcode graph similarity and metamorphic detection. Journal in Computer Virology, 8(1-2):37--52, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Schneier and J. Kelsey. Secure audit logs to support computer forensics. ACM Transactions on Information and System Security, 2(2):159--176, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Shalev-Shwartz and S. Ben-David. Understanding Machine Learning: From Theory to Algorithms. Cambridge University Press, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Slowinska and H. Bos. Pointless tainting?: evaluating the practicality of pointer tainting. In Proceedings of the 4th ACM European Conference on Computer Systems, pages 61--74. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. R. Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological), pages 267--288, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  31. G. Vigna. Antivirus isn't dead, it just can't keep up. http://labs.lastline.com/lastline-labs-av-isnt-dead-it-just-cant-keep-up, May 2014.Google ScholarGoogle Scholar
  32. C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 133--145. IEEE, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  33. T.-F. Yen, A. Oprea, K. Onarlioglu, T. Leetham, W. Robertson, A. Juels, and E. Kirda. Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks. In Proceedings of the 29th Annual Computer Security Applications Conference, pages 199--208. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 116--127. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Malicious Behavior Detection using Windows Audit Logs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        AISec '15: Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security
        October 2015
        110 pages
        ISBN:9781450338264
        DOI:10.1145/2808769

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 October 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        AISec '15 Paper Acceptance Rate11of25submissions,44%Overall Acceptance Rate94of231submissions,41%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader