Skip to main content
Top

2017 | OriginalPaper | Chapter

Malware Analysis and Detection via Activity Trees in User-Dependent Environment

Authors : Arnur Tokhtabayev, Anton Kopeikin, Nurlan Tashatov, Dina Satybaldina

Published in: Computer Network Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We present a new system that offers detection and analysis of modern complex malware including user-oriented and targeted attacks. These attacks stem from users’ misbehavior, e.g. misinterpreting or ignoring security alerts, which lead to proliferation of malicious objects inside trusted perimeter of cyber-security systems (e.g. exclusion list of AVs). The attack mechanisms include strategic web compromise, spear phishing, insider threat and social network malware. Moreover, targeted attacks often deliver zero-day malware that is made difficult to be detected, e.g. due to distributed malicious payload.
The system provides a secure container enabling user-dependent environment in malicious activity analysis, which is achieved by user interaction simulation in real time. The user interaction simulator recognizes GUI components and clicks through them according to click patterns of a typical user, e.g. office employee. To provide effective malware detection, our team developed a new technology for deep dynamic inspection of system-wide behavior, which is based on structural analysis of so-called activity trees defined in the domain of system functionalities. We use Modified Hierarchical Colored Petri Nets for run-time recognition of system functionalities including obfuscated and distributed ones. We our system with corpus of real malware families. Results show high efficiency of our system in detecting and blocking malware while having low system overhead.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cohen, F.: Computer viruses theory and experiments, Computers and Security, v. 6 (1987) Cohen, F.: Computer viruses theory and experiments, Computers and Security, v. 6 (1987)
3.
go back to reference Tokhtabayev, A.G., Skormin, V.A., Dolgikh, A.M.: Expressive, efficient and obfuscation resilient behavior based IDS. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 698–715. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15497-3_42 CrossRef Tokhtabayev, A.G., Skormin, V.A., Dolgikh, A.M.: Expressive, efficient and obfuscation resilient behavior based IDS. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 698–715. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-15497-3_​42 CrossRef
4.
go back to reference Tokhtabayev, A., Skormin, V., Dolgikh, A.: Detection of worm propagation engines in the system call domain using colored petri nets. In: Proceedings of the IEEE IPCCC ’07, USA, December 2008 Tokhtabayev, A., Skormin, V., Dolgikh, A.: Detection of worm propagation engines in the system call domain using colored petri nets. In: Proceedings of the IEEE IPCCC ’07, USA, December 2008
5.
go back to reference Jensen, K.: Coloured Petri nets (2nd ed.): basic concepts, analysis methods and practical use, vol. 1. Springer, Berlin (1996) Jensen, K.: Coloured Petri nets (2nd ed.): basic concepts, analysis methods and practical use, vol. 1. Springer, Berlin (1996)
6.
go back to reference Bernaschi, M., Grabrielli, E., Mancini, L.: Operating system enhancements to prevent the misuse of system calls. In: Proceedings of the ACM CCS 2000, pp. 174–183 (2000) Bernaschi, M., Grabrielli, E., Mancini, L.: Operating system enhancements to prevent the misuse of system calls. In: Proceedings of the ACM CCS 2000, pp. 174–183 (2000)
7.
go back to reference Kang, D., Fuller, D., Honavar, V.: Learning classifiers for misuse and anomaly detection using a bag of system calls representation. In: Proceedings of the 6th IEEE Systems Man and Cybernetics Information Assurance Workshop (IAW), pp. 118–125 (2005) Kang, D., Fuller, D., Honavar, V.: Learning classifiers for misuse and anomaly detection using a bag of system calls representation. In: Proceedings of the 6th IEEE Systems Man and Cybernetics Information Assurance Workshop (IAW), pp. 118–125 (2005)
8.
go back to reference Skormin, V., Volynkin, A., et al.: Run-Time detection of malicious self-replication in binary executables. J. Comput. Secur. 15(2), pp. 273–301 (2007) Skormin, V., Volynkin, A., et al.: Run-Time detection of malicious self-replication in binary executables. J. Comput. Secur. 15(2), pp. 273–301 (2007)
9.
go back to reference Bayer, U., et al.: Dynamic analysis of malicious code. J. Comput. Virol. 2(1), 67–77 (2006) Bayer, U., et al.: Dynamic analysis of malicious code. J. Comput. Virol. 2(1), 67–77 (2006)
10.
go back to reference Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the ESEC-FSE’07, NY, USA (2007) Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the ESEC-FSE’07, NY, USA (2007)
11.
go back to reference Kouznetsov, V.: US Patent 6973577 B1: System and Method for Dynamically Detecting Computer Viruses Through Associative Behavioral Analysis of Runtime State, 6 December 2005 Kouznetsov, V.: US Patent 6973577 B1: System and Method for Dynamically Detecting Computer Viruses Through Associative Behavioral Analysis of Runtime State, 6 December 2005
12.
go back to reference Martignoni, L., et al.: A layered architecture for detecting malicious behaviors. In: Proceedings of the RAID 2008 (2008) Martignoni, L., et al.: A layered architecture for detecting malicious behaviors. In: Proceedings of the RAID 2008 (2008)
Metadata
Title
Malware Analysis and Detection via Activity Trees in User-Dependent Environment
Authors
Arnur Tokhtabayev
Anton Kopeikin
Nurlan Tashatov
Dina Satybaldina
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_17

Premium Partner