Back to Search Start Over

A Layered Architecture for Detecting Malicious Behaviors.

Authors :
Martignoni, Lorenzo
Stinson, Elizabeth
Fredrikson, Matt
Jha, Somesh
Mitchell, John C.
Source :
Recent Advances in Intrusion Detection (9783540874027); 2008, p78-97, 20p
Publication Year :
2008

Abstract

We address the semantic gap problem in behavioral monitoring by using hierarchical behavior graphs to infer high-level behaviors from myriad low-level events. Our experimental system traces the execution of a process, performing data-flow analysis to identify meaningful actions such as ˵proxying″, ˵keystroke logging″, ˵data leaking″, and ˵downloading and executing a program″ from complex combinations of rudimentary system calls. To preemptively address evasive malware behavior, our specifications are carefully crafted to detect alternative sequences of events that achieve the same high-level goal. We tested eleven benign programs, variants from seven malicious bot families, four trojans, and three mass-mailing worms and found that we were able to thoroughly identify high-level behaviors across this diverse code base. Moreover, we effectively distinguished malicious execution of high-level behaviors from benign by identifying remotely-initiated actions. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540874027
Database :
Complementary Index
Journal :
Recent Advances in Intrusion Detection (9783540874027)
Publication Type :
Book
Accession number :
76725671
Full Text :
https://doi.org/10.1007/978-3-540-87403-4_5