860 likes | 1.21k Views
Malware Detection based on Application Behavior Modeling. NWMTD’11 Jun 20–21, 2011. Mrs P.R.Lakshmi Eswari C-DAC, Hyderabad. Evolution of Malware Attacks. Malware Definition (Wikipedia). A software which is designed to infiltrate a computer system without the owner’s informed consent
E N D
Malware Detection based on Application Behavior Modeling NWMTD’11 Jun 20–21, 2011 Mrs P.R.Lakshmi Eswari C-DAC, Hyderabad
Malware Definition (Wikipedia) A software which is designed to infiltrate a computer system without the owner’s informed consent Refers to a variety of forms of hostile, intrusive, annoying software code MALicious softWARE
Threat from the Malware • A code • which collects the credit card number or any other personal info • Which makes an application do the buffer overflow and crash • Loosing the private and sensitive information • which shows annoying advertisements without your consent • Which encrypts the data and asks for money to decrypt it
A Typical Malware Exploit Logic • Motivational Logic • Spam • Data theft • Ransom • Disrupt the routine • Protection Logic • Packing • Anti Debugging • Anti Virtualization Propagation Logic Mails USBs
Attacks - Classified • Untargeted attacks • Attacking websites • Infecting portable storage devices • Attacking social networking websites • Wild malware (worms etc) • Botnets • Targeted Attacks
A Typical Attack Originally a executable Doc file Opens the file, and executes the malware Whenever updates windows, also downloads the malware, sends the data out etc. Malware Changes the windows update program
Botnet IRC Server 4. Attacker will also join this channel (preferably through a program) and issue commands (for e.g. update) 3. Join a channel on IRC Receives the command (update) 1. Exploit / Attack Victim 2. Download malware (bot)
Botnet DDoS (distributed denial of service attacks) Collecting lot of bank related data Spidering attacks (on websites) Spams Using victim for other sensitive attack Shutdown the computer etc
Malware Detection Techniques • Black listing • Anti Virus • Intrusion Detection System • Behavior Based Malware Detection • White listing • Specification Based Detection • Anomaly Detection
End System Security Suites • Centralized configuration on all clients • Centrally controlled • Firewall • Encryption • Device Control • Anti Malware • Security policies
White listing Solutions Core Trace Bouncer Bit9 Parity Robot Genius Microsoft App Locker McAfee Application Control
Don’t want to pay ? ! Free Anti Virus [AVG, AVIRA, AVAST] Free Firewall [Zone Alarm] URL Scanner [AVG, WOT, RG Guard] Trend Micro Web Protection Add on Disable Auto runs Returnil Virtual System / Windows Steady State Wehn-Trust HIPS [MUST for Windows XP – ASLR Tool] Win-pooch HIPS [Windows XP] OSSEC HIDS WinPatrol [BillP Studios]
How anti malware works? Behaviors database Behavior Based Engine (On Process Activities) Basic Activity Scanning * Malware Signature database Anti Virus Scanning (On file content) Known Applications database White listing (On process creation) ( * Process activity, file read or write )
MPS - Approach Each application makes sequence of system calls for accessing various OS resources through multiple control paths (normal behaviour) When the application is infected with malware, its behaviour changes User Process n User Process 1 User Process 2 …………….. User Space System Calls Kernel Space Operating System Detects malicious activity before it causes damage to end system i.e. before the system calls are executed by the operating system
Malware Prevention System 1. Application Profiling and Model Generation Process in a Sandbox 4. Client Protection against overall threats - Process Execution Control Model Enforcement Module 2. Server Manages the models and admin can set the policies here Server communication module 3. Based on the policies the model gets pushed to clients 27
Resource - A System calls : {1,2,4} Resource - B System calls: {1,3,4,2} Resource - C System calls: {1,2,4} Model Generation
Operations Hooked in MPS File System Calls Process hooks Network Calls Registry Calls
Update Request MPS Server MPS Client UPDATE_REQUEST UPDATE_RESPONSE Major No, Minor No, OS type, ModelUpdate, Db Major No, Db Minor No No.of Model Files, Model File names, ModelFile Path
File Transfer Request MPS Server MPS Client TRANSFER_REQUEST TRANSFER_RESPONSE Model File Name with path Contents of the Model File
Log Message Request Application name, OS type, Date, IP, Operation, Path Success or Fail
Client and Server – Technologies used Server on Linux Apache Server 2.2 Virtual Machine Windows XP, Vista and 7 images Linux 2.6.23 kernel image Java runtime environment PHP HTTP message format XML, OpenSSL Windows Client Mini Filter Driver Call out Drivers Win32 programming C, C++ programming PE Executable format Open SSL Linux Client Linux Security Modules C, C++ programming Qt Programming OpenSSL
Malicious Pdf Creation of Axsle.dll Creation of Icucnv34.dll Write file on cvs.exe The malware repeatedly tries to write cvs.exe file and it gets blocked. The document doesn’t open until the write file operation on cvs.exe is completed.
Stuxnet • Behaviors Detected • Hides view of system files • Hidden image file • File has system attribute • Creates logon entry • Unsigned binary • Drops executable • Modifies internet settings • Spawns process
ATT27390 doc file • Activities blocked • Dropping of zipfldr.dll in system32 folder • Dropping of wuaueng.dll in system32 folder
Field Testing Report • MPS is compared with similar best commercial tools available in the market like NovaShield, Mamutu, Malware Defender, Sana Security Primary Response, Safe Connect, Threat fire etc.
Field Testing Report • MPS is found sensitive against blended MS office and PDF documents wherein the MPS solution alone identified the malicious activity as the other industry product remain silent • Application has a tendency to raise false alarm against benign documents as it might match the enforcement policies defined • Overall it is felt that the solution is detecting high level targeted malware behaviours, but there is a need to improve the capabilities by suppressing the false alarms.