Behavioral Detection of Malware on Mobile Handsets Abhijit Bose IBM TJ Watson Research Xin Hu University of Michigan Kang G. Shin University of Michigan.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Mobile Viruses and Worms (Project Group 6) Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford, Ryan O’Hare, Arati Baliga, Vinod Ganapathy, and Liviu Iftode Department.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
1 Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code (DOME) Subha Ramanathan & Arun Krishnamurthy Nov 15, 2005.
Lecture 14 Malicious Software (cont) modified from slides of Lawrie Brown.
Bypassing antivirus detection with encryption
Learning on User Behavior for Novel Worm Detection.
SEERE, Neum 2009 Runtime verification of Java programs using ITL Vladimir Valkanov, Damyan Mitev Plovdiv, Bulgaria.
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Symbian os with smart phones Guided by: Hetal A Josiyara
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Automated malware classification based on network behavior
MutantX-S: Scalable Malware Clustering Based on Static Features Xin Hu, IBM T.J. Watson Research Center; Sandeep Bhatkar and Kent Griffin, Symantec Research.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
A Hybrid Model to Detect Malicious Executables Mohammad M. Masud Latifur Khan Bhavani Thuraisingham Department of Computer Science The University of Texas.
CISC Machine Learning for Solving Systems Problems Presented by: Akanksha Kaul Dept of Computer & Information Sciences University of Delaware SBMDS:
Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection © 2013 Narus, Inc. Prakash Comar 1 Lei Liu 1 Sabyasachi (Saby) Saha 2 Pang-Ning.
Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar Submitted to Prof.Dr. Eduard Heindl.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
APT29 HAMMERTOSS Jayakrishnan M.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Input/OUTPUT [I/O Module structure].
Seminar On Cellular Virus
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Malware Analysis Jaimin Shah & Krunal Patel Vishal Patel & Shreyas Patel Georgia Institute of Technology School of Electrical and Computer Engineering.
Automated Classification and Analysis of Internet Malware M. Bailey J. Oberheide J. Andersen Z. M. Mao F. Jahanian J. Nazario RAID 2007 Presented by Mike.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
Brandon Resheske. What is Malware? Code designed to interfere with normal computer operation The correct general term, instead of ‘virus.’ Basically,
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Biologically Inspired Defenses against Computer Viruses International Joint Conference on Artificial Intelligence 95’ J.O. Kephart et al.
SPAM DETECTION AND FILTERING By Prasanna Kunchavaram.
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
CISC Machine Learning for Solving Systems Problems Presented by: Ashwani Rao Dept of Computer & Information Sciences University of Delaware Learning.
Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Instructor: Dr. Harold C. Grossman Student: Subhra S. Sarkar
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
CISC Machine Learning for Solving Systems Problems Presented by: Satyajeet Dept of Computer & Information Sciences University of Delaware Automatic.
HoneyComb HoneyComb Automated IDS Signature Generation using Honeypots Prepare by LIW JIA SENG Supervisor : AP. Dr. Mohamed Othman.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
BotCop: An Online Botnet Traffic Classifier 鍾錫山 Jan. 4, 2010.
CISC Machine Learning for Solving Systems Problems Presented by: Suparna Manjunath Dept of Computer & Information Sciences University of Delaware.
VMM Based Rootkit Detection on Android
NETWORK SECURITY Definitions and Preventions Toby Wilson.
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
October 20-23rd, 2015 FEEBO: A Framework for Empirical Evaluation of Malware Detection Resilience Against Behavior Obfuscation Sebastian Banescu Tobias.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Learning to Detect and Classify Malicious Executables in the Wild by J
Ilija Jovičić Sophos Consultant.
Seminar On Cellular Virus
Techniques, Tools, and Research Issues
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Roland Kwitt & Tobias Strohmeier
Chap 10 Malicious Software.
A survey of network anomaly detection techniques
Chap 10 Malicious Software.
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
Presentation transcript:

Behavioral Detection of Malware on Mobile Handsets Abhijit Bose IBM TJ Watson Research Xin Hu University of Michigan Kang G. Shin University of Michigan Taejoon Park Samsung Electronics MobiSys 2008

Outline Introduction System Overview Malicious Behavior Signatures Run-time Construction of Behavior Signatures Behavior Classification by Machine Learning Algorithm Limitations Evaluation Conclusions

Introduction % of MMS traffic in a Russian mobile network is made up of infected message (close to malicious traffic) By the end of 2006, the known number of mobile malware families and their variants increased by 69% and 75%

Introduction Payload signature-based detection isn’t suitable for mobile devices Limited resources (power, CPU, memory) Crossover worms, obfuscation, polymorphism

System Overview

Malicious Behavior Signatures Temporal Logic ⊙ t true at time t ♦t true at some instant before t □ t true at all instants before t true at some instant in the interval [t −k, t].

Malicious Behavior Signatures Example: Commwarrior Worm Target: Symbian S60 Spread via Bluetooth and MMS

Malicious Behavior Signatures Atomic propositional variables ReceviceFile(f,mode,type) InstallApp(f,files,dir) LaunchProcess(p,parent) MakeSIS(f,files) BTFindDevice(d) OBEXSendFile(f,d) MMSFindAddress(a) MMSSendMessage(f,a) SetDevice(act, ) VerifyDayofMonth(date, )

Malicious Behavior Signatures Signature: ⊙ t (bt −transfer) = ♦t(BTFindDevice(d)) ∧ ( ⊙ t (OBEXSendFile(f,d))) ⊙ t (mms−transfer) = ♦t (MMSFindAddress(a)) ∧ ( ⊙ t (MMSSendMessage(f,a))) ⊙ t (init −worm) = t (ReceiveFile(mode = Bluetooth)) ∨ ( ⊙ t (ReceiveFile(mode = MMS))) ⊙ t (activate−worm) = ♦t (init −worm) ∧ ( ⊙ t (InstallApp) ∧ ⊙ t(LaunchProcess)) ⊙ t (run−worm−1) = ♦t (activate−worm) ∧ ( ⊙ t (MakeSIS) ∧ ⊙ t (VerifyDayofMonth) ∧ ( (SetDevice))) ⊙ t (run−worm−2) = ♦t (activate−worm) ∧ ( ⊙ t (MakeSIS) ∧ (( bt −transfer))) ⊙ t (run−worm−3) = ♦t (activate−worm) ∧ ( ⊙ t (MakeSIS) ∧ ( (mms−transfer)))

Malicious Behavior Signatures Generalized Behavior Signatures User Data Integrity System Data Integrity Trojan-like Actions

Run-time Construction of Behavior Signatures Proxy DLL technique log(timestamp,ret,obj,istatus);

Run-time Construction of Behavior Signatures Generation of Dependency Graph Graph Pruning and Aggregation

Behavior Classification by Machine Learning Algorithm Use SVM as Support Vector Classification (SVC)SVM A key step in SVM is mapping of the vectors x from their original input space to a higher- dimensional dot-product space

Limitations Obfuscation? Novel malware Some malware may bypass the API monitoring rootkit

Evaluation Malware Cabir, Mabir, Lasco, Commwarrior, and a generic worm Legitimate Bluetooth file transfer, MMS client, MakeSIS utility 905 distinct signatures for test data set

Evaluation

Real-world worms Cabir has 32 variants Cabir.H : fix bug Cabir.AF : compression New Cabir : obfuscation

Evaluation Performance of Proxy DLL 3%

Conclusions Behavioral detection framework Behavior signature Use SVM to train a classifier from normal and malicious data