Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John Mitchell RAID 2008 1.

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Effective and Efficient Malware Detection at the End Host Clemens Kolbitsch, Paolo Milani TU Vienna Christopher UCSB Engin Kirda.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Botnet Dection system. Introduction  Botnet problem  Challenges for botnet detection.
Application architectures
End-to-End Design of Embedded Real-Time Systems Kang G. Shin Real-Time Computing Laboratory EECS Department The University of Michigan Ann Arbor, MI
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Certification Test Tool Update Toby Nixon Program Manager Microsoft Corporation.
Maintaining and Updating Windows Server 2008
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E. In Proc. of the 14th ACM conference on Computer and communications security, October /9/31.
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Survey “Intrusion Detection: Systems and Models” “A Stateful Intrusion Detection System for World-Wide Web Servers”
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Windows 7 Firewall.
Dart: A Meta-Level Object-Oriented Framework for Task-Specific Behavior Modeling by Domain Experts R. Razavi et al..OOPSLA Workshop DSML‘ Dart:
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Lit Space Monitoring for Botnets Stuart Staniford Chief Scientist 1/21/2008.
Contents 1.Introduction, architecture 2.Live demonstration 3.Extensibility.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Automated Classification and Analysis of Internet Malware M. Bailey J. Oberheide J. Andersen Z. M. Mao F. Jahanian J. Nazario RAID 2007 Presented by Mike.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
Roberto Paleari,Universit`a degli Studi di Milano Lorenzo Martignoni,Universit`a degli Studi di Udine Emanuele Passerini,Universit`a degli Studi di Milano.
Identification of Bot Commands By Run-time Execution Monitoring Younghee Park, Douglas S. Reeves North Carolina State University ACSAC
Christopher Kruegel University of California Engin Kirda Institute Eurecom Clemens Kolbitsch Thorsten Holz Secure Systems Lab Vienna University of Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
The Software Development Process
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Mining Specifications of Malicious Behavior Mihai Christodorescu (work done at University of Wisconsin) Somesh Jha University of Wisconsin Christopher.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Malicious Software.
Module 10: Windows Firewall and Caching Fundamentals.
SubVirt: Implementing malware with virtual machines Authors: Samuel T. King, Peter M. Chen University of Michigan Yi-Min Wang, Chad Verbowski, Helen J.
Development of e-Science Application Portal on GAP WeiLong Ueng Academia Sinica Grid Computing
WebWatcher A Lightweight Tool for Analyzing Web Server Logs Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory
NETWORK SECURITY Definitions and Preventions Toby Wilson.
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
Java Distributed Object Model A remote object is one whose methods can be invoked from another JVM on a different host. It implements one or more remote.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Maintaining and Updating Windows Server 2008 Lesson 8.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Load Test Scenario Presentation Outline Introduction to Load Test Load Test capability of eValid Steps to create the Load Test Scripts.
Module 4: Troubleshooting Web Servers. Overview Use IIS 7.0 troubleshooting features to gather troubleshooting information Use the Runtime Control and.
Network System Security - Task 2. Russell Johnston.
TMG Client Protection 6NPS – Session 7.
NetSpy: Automatic Generation of Spyware Signatures for NIDS
Utilize Group Policy Terminal Server Settings
Xutong Chen and Yan Chen
Real-Time Attack Detection in CPS
Class 4: Repetition Pretest Posttest Counting Flowchart these!
Chapter 5 Architectural Design.
Real-Time RAT-based APT Detection
Presentation transcript:

Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John Mitchell RAID

Bot-infected Computers Botnets are used to perform nefarious tasks, such as: keystroke logging, spyware installation, denial-of-service (DoS) attacks, hosting phishing web sites or command-and-control servers, spamming, click fraud, license key theft 2

Disadvantage of Traditional Method Even the most effective malware detectors fail to detect more than 30% of malware seen in the wild. Traditional malware detectors are based on syntactic signatures Malware producers can easily generate malware variants capable of evading existing signatures. Malware detectors have a finite set of syntactic signatures, but malicious programs have in infitely mutable syntax 3

Behavior-based malware detection Detect high-level actions that financially motivate malware development & distribution keystroke logging data leaking proxying program download and execute 4

Semantic gap between models and monitored events Monitor execution of the program using an emulator Lowest level events in behavior specifications are system calls Malicious behaviors are described as sequences of essential actions E.g. What we see NtDeviceIo... NtOpenFile NtCreateSe... NtMapView... is dierent from the essential actions we need to identify download a file and execute it Behaviors Low-level events 5

Solutions Complex & high-level behaviors are decomposed into multiple layers. The lowest layer represents system call invocations. Upper layers have a richer semantics. E.g. Hierarchy of events used to specify download_exec 6

Contributions A behavior-speciation language that can be used to describe novel, semantically meaningful behaviors. A detector that identifies when a process performs a specified high-level action, regardless of the process's source-code implementation of the action. Our evaluation demonstrates that our detector can distinguish malicious execution of high-level behaviors from benign. 7

Behavior Graphs A behavior graph is a directed graph of a form that is adapted from and extends AND/OR graphs. 8

Behavior Graphs Internal nodes represent events (with formal parameters) 9

Behavior Graphs Edges represent predicates on events arguments 10

Behavior Graphs ORed edges represent events of which at least one has to occur 11

Behavior Graphs ANDed edges represent events that all have to occur (but can occur in any order) 12

Behavior Graphs Annihilator and replicator nodes represent events that destroy and duplicate resources 13

Behavior Graphs Acceptor nodes represent actions taken by our system when behaviors are matched 14

Matching Malicious Behaviors 15 OS events are passed to the lowest layer

Construction of behavior graphs They developed our graphs manually and iteratively through domain knowledge and analysis of tens of gigabytes of execution traces, obtained from multiple runs of 1. around fifteen standard applications 2. over one hundred specially-crafted programs, 3. several malicious programs. 16

Architecture of the system Customized Qemu that instruments the guest code to monitor system call invocations, to perform taint analysis, and to track local user input. A behavior matcher that receives events in real-time and tries to match each behavior graph loaded. 17

Spec. of Malicious Behavior RI stands for Remotely Initiated Tainted refers to data received over the network 18

Result on Malicious bots Blank entries denote behaviors not matched because the bot did not implement them 19

Results on Benign Applications Under 2 scenarios: UI refers to an experiment in which user input tracking was not used, and “UI” to one which enabled User input tracking is very important to distinguish between behaviors triggered by the user and behaviors triggered automatically 20

Comments False Positive Problem!! E.g. Automatic Windows Update 21