A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
Malware writers have employed various obfuscation and polymorphism techniques to thwart static analysis
approaches and bypassing antivirus tools. Dynamic analysis techniques, however, have essentially
overcome these deceits by observing the actual behaviour of the code execution. In this regard, various
methods, techniques and tools have been proposed. However, because of the diverse concepts and
strategies used in the implementation of these methods and tools, security researchers and malware
analysts find it difficult to select the required optimum tool to investigate the behaviour of a malware and to
contain the associated risk for their study. Focusing on two dynamic analysis techniques: Function Call
monitoring and Information Flow Tracking, this paper presents a comparison framework for dynamic
malware analysis tools. The framework will assist the researchers and analysts to recognize the tool’s
implementation strategy, analysis approach, system-wide analysis support and its overall handling of
binaries, helping them to select a suitable and effective one for their study and analysis.
ABSTRACT :
--------------------
Modern malware that are metamorphic or polymorphic in nature mutate their code by employing code obfuscation and encryption methods to thwart detection. Thus, conventional signature based scanners fail to detect these malware. In order to address the problems of detecting known variants of metamorphic malware, we propose a method using bioinformatics techniques effectively used for Protein and DNA matching. Instead of using exact signature matching methods, more sophisticated signature(s) are extracted using multiple sequence alignment (MSA). The results show that the proposed method is capable of identifying malware variants with minimum false alarms and misses. Also, the detection rate achieved with our proposed method is better compared to commercial antivirus products used in the study.
Status:
----------
This work has been accepted by 8th IEEE International Conference on Innovations in Information Technology (Innovations'12).
Link:
-------
http://ieeexplore.ieee.org/xpl/login.jsp?reload=true&tp=&arnumber=6207739&url=http://ieeexplore.ieee.org/iel5/6203543/6207707/06207739.pdf?arnumber=6207739
e-mail: grijesh.mnit@gmail.com
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
Malware writers have employed various obfuscation and polymorphism techniques to thwart static analysis
approaches and bypassing antivirus tools. Dynamic analysis techniques, however, have essentially
overcome these deceits by observing the actual behaviour of the code execution. In this regard, various
methods, techniques and tools have been proposed. However, because of the diverse concepts and
strategies used in the implementation of these methods and tools, security researchers and malware
analysts find it difficult to select the required optimum tool to investigate the behaviour of a malware and to
contain the associated risk for their study. Focusing on two dynamic analysis techniques: Function Call
monitoring and Information Flow Tracking, this paper presents a comparison framework for dynamic
malware analysis tools. The framework will assist the researchers and analysts to recognize the tool’s
implementation strategy, analysis approach, system-wide analysis support and its overall handling of
binaries, helping them to select a suitable and effective one for their study and analysis.
ABSTRACT :
--------------------
Modern malware that are metamorphic or polymorphic in nature mutate their code by employing code obfuscation and encryption methods to thwart detection. Thus, conventional signature based scanners fail to detect these malware. In order to address the problems of detecting known variants of metamorphic malware, we propose a method using bioinformatics techniques effectively used for Protein and DNA matching. Instead of using exact signature matching methods, more sophisticated signature(s) are extracted using multiple sequence alignment (MSA). The results show that the proposed method is capable of identifying malware variants with minimum false alarms and misses. Also, the detection rate achieved with our proposed method is better compared to commercial antivirus products used in the study.
Status:
----------
This work has been accepted by 8th IEEE International Conference on Innovations in Information Technology (Innovations'12).
Link:
-------
http://ieeexplore.ieee.org/xpl/login.jsp?reload=true&tp=&arnumber=6207739&url=http://ieeexplore.ieee.org/iel5/6203543/6207707/06207739.pdf?arnumber=6207739
e-mail: grijesh.mnit@gmail.com
The growing prevalence of network attacks is a well-known problem which can impact the availability, confidentiality, and integrity of critical information for both individuals and enterprises. In this paper, we propose a real-time intrusion detection approach using a supervised machine learning technique. Our approach is simple and efficient, and can be used with many machine learning techniques. We applied different well-known machine learning techniques to evaluate the performance of our IDS approach. Our experimental results show that the Decision Tree technique can outperform the other techniques. Therefore, we further developed a real-time intrusion detection system (RT-IDS) using the Decision Tree technique to classify on-line network data as normal or attack data. We also identified 12 essential features of network data which are relevant to detecting network attacks using the information gain as our feature selection criterions. Our RT-IDS can distinguish normal network activities from main attack types (Probe and Denial of Service (DoS)) with a detection rate higher than 98% within 2 s. We also developed a new post-processing procedure to reduce the false-alarm rate as well as increase the reliability and detection accuracy of the intrusion detection system.
TriggerScope: Towards Detecting Logic Bombs in Android ApplicationsPietro De Nicolao
Presentation of paper "TriggerScope: Towards Detecting Logic Bombs in Android Applications" for the course of Advanced Topics in Computer Security of prof. Stefano Zanero.
Source and further information: https://github.com/pietrodn/triggerscope
Adware is a software that may be installed on the client machine for displaying advertisements for the
user of that machine with or without consideration of user. Adware can cause unrecoverable threat to the security
and privacy of computer users as there is an increase in number of malicious adware’s. The paper presents an
adware detection approach based on the application of data mining on disassembled code. This is an approach for
an accurate adware detection algorithm with adware data set and machine learning techniques. In this paper, we
disassemble binary files, generate instruction sequences and past his data through different data mining as well as
machine learning algorithms for feature extraction and feature reduction for detection of malicious adware.Then
system accurately detect both novel and known adware instances even though the binary difference between
adware and legitimate software is usually small.
Keywords — Data Mining; Adware Detection; Binary Classification; Static Analysis; Disassembly;
Instruction Sequences
Presentation describes the idea of heuristic scanning - method used for malware detection and recognition by almost every modern antivirus product. I explain how heuristic scanning works, why it is better than conventional solutions like signature scan, how it bypasses antiheuristic techniques used by malware. Finally I present modern and even future solutions such as Nereus - genetic heuristic engine, developed by Panda Security.
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...ijcsit
Intrusion Detection System (IDS) has been an effective way to achieve higher security in detecting malicious activities for the past couple of years. Anomaly detection is an intrusion detection system. Current anomaly detection is often associated with high false alarm rates and only moderate accuracy and detection rates because it’s unable to detect all types of attacks correctly. An experiment is carried out to evaluate the performance of the different machine learning algorithms using KDD-99 Cup and NSL-KDD datasets. Results show which approach has performed better in term of accuracy, detection rate with reasonable false alarm rate.
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
Seminar Report : Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
By:
Jowin John Chemban (jowinchemban@gmail.com)
HGW16CS022 (2016-2020 Batch)
S7 B.Tech Computer Science Engineering
Holy Grace Academy of Engineering, Mala
Date : November 2019
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemIJRES Journal
With today’s world filled with information and data, it is very important for one to know which information or data is harmless and which is harmful. Right from cellular phones to big MNCs and Server companies require a security system that is as competent and adaptive as its ever-updating and evolving viruses or malware. The paper talks about the development and implementation of a new idea Adaptive anti-virus based on Anfis logic. An adaptive anti-virus system that will catch up to the speed at which the viruses update and evolve.
Intrusion detection system based on web usage miningIJCSEA Journal
This artical present a system developed to find cyber threats automatically based on web usage mining
methods in application layer. This system is an off-line intrusion detection system which includes different
part to detect attacks and as a result helps find different kinds of attacks with different dispersals. In this
study web server access logs used as the input data and after pre-processing, scanners and all identified
attacks will be detected. As the next step, vectors feature from web access logs and parameters sent by
HTTP will derived by three different means and at the end by employment of two clustering algorithms
based on K-Means, anomaly behaviour of data are detached. Tentative results derived from this system
represent that used methods are more applicable than similar systems because this system covers different
kinds of attacks and mostly increase the accuracy and decrease false alarms.
Malware Detection Using Data Mining Techniques Akash Karwande
Computer programs which have a destructive content and applied to systems from invader, are called malware and the systems on which this program are applied is called victim system .
Malwares are classified into several kinds based on behavior or attack methods.
If you want to make your career in ethical hacking, Bytecode Security offers the best malware analysis course online offline with job placement assistance. Read more: https://www.bytec0de.com/malware-analysis-course-training-certification/
The growing prevalence of network attacks is a well-known problem which can impact the availability, confidentiality, and integrity of critical information for both individuals and enterprises. In this paper, we propose a real-time intrusion detection approach using a supervised machine learning technique. Our approach is simple and efficient, and can be used with many machine learning techniques. We applied different well-known machine learning techniques to evaluate the performance of our IDS approach. Our experimental results show that the Decision Tree technique can outperform the other techniques. Therefore, we further developed a real-time intrusion detection system (RT-IDS) using the Decision Tree technique to classify on-line network data as normal or attack data. We also identified 12 essential features of network data which are relevant to detecting network attacks using the information gain as our feature selection criterions. Our RT-IDS can distinguish normal network activities from main attack types (Probe and Denial of Service (DoS)) with a detection rate higher than 98% within 2 s. We also developed a new post-processing procedure to reduce the false-alarm rate as well as increase the reliability and detection accuracy of the intrusion detection system.
TriggerScope: Towards Detecting Logic Bombs in Android ApplicationsPietro De Nicolao
Presentation of paper "TriggerScope: Towards Detecting Logic Bombs in Android Applications" for the course of Advanced Topics in Computer Security of prof. Stefano Zanero.
Source and further information: https://github.com/pietrodn/triggerscope
Adware is a software that may be installed on the client machine for displaying advertisements for the
user of that machine with or without consideration of user. Adware can cause unrecoverable threat to the security
and privacy of computer users as there is an increase in number of malicious adware’s. The paper presents an
adware detection approach based on the application of data mining on disassembled code. This is an approach for
an accurate adware detection algorithm with adware data set and machine learning techniques. In this paper, we
disassemble binary files, generate instruction sequences and past his data through different data mining as well as
machine learning algorithms for feature extraction and feature reduction for detection of malicious adware.Then
system accurately detect both novel and known adware instances even though the binary difference between
adware and legitimate software is usually small.
Keywords — Data Mining; Adware Detection; Binary Classification; Static Analysis; Disassembly;
Instruction Sequences
Presentation describes the idea of heuristic scanning - method used for malware detection and recognition by almost every modern antivirus product. I explain how heuristic scanning works, why it is better than conventional solutions like signature scan, how it bypasses antiheuristic techniques used by malware. Finally I present modern and even future solutions such as Nereus - genetic heuristic engine, developed by Panda Security.
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...ijcsit
Intrusion Detection System (IDS) has been an effective way to achieve higher security in detecting malicious activities for the past couple of years. Anomaly detection is an intrusion detection system. Current anomaly detection is often associated with high false alarm rates and only moderate accuracy and detection rates because it’s unable to detect all types of attacks correctly. An experiment is carried out to evaluate the performance of the different machine learning algorithms using KDD-99 Cup and NSL-KDD datasets. Results show which approach has performed better in term of accuracy, detection rate with reasonable false alarm rate.
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
Seminar Report : Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
By:
Jowin John Chemban (jowinchemban@gmail.com)
HGW16CS022 (2016-2020 Batch)
S7 B.Tech Computer Science Engineering
Holy Grace Academy of Engineering, Mala
Date : November 2019
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemIJRES Journal
With today’s world filled with information and data, it is very important for one to know which information or data is harmless and which is harmful. Right from cellular phones to big MNCs and Server companies require a security system that is as competent and adaptive as its ever-updating and evolving viruses or malware. The paper talks about the development and implementation of a new idea Adaptive anti-virus based on Anfis logic. An adaptive anti-virus system that will catch up to the speed at which the viruses update and evolve.
Intrusion detection system based on web usage miningIJCSEA Journal
This artical present a system developed to find cyber threats automatically based on web usage mining
methods in application layer. This system is an off-line intrusion detection system which includes different
part to detect attacks and as a result helps find different kinds of attacks with different dispersals. In this
study web server access logs used as the input data and after pre-processing, scanners and all identified
attacks will be detected. As the next step, vectors feature from web access logs and parameters sent by
HTTP will derived by three different means and at the end by employment of two clustering algorithms
based on K-Means, anomaly behaviour of data are detached. Tentative results derived from this system
represent that used methods are more applicable than similar systems because this system covers different
kinds of attacks and mostly increase the accuracy and decrease false alarms.
Malware Detection Using Data Mining Techniques Akash Karwande
Computer programs which have a destructive content and applied to systems from invader, are called malware and the systems on which this program are applied is called victim system .
Malwares are classified into several kinds based on behavior or attack methods.
If you want to make your career in ethical hacking, Bytecode Security offers the best malware analysis course online offline with job placement assistance. Read more: https://www.bytec0de.com/malware-analysis-course-training-certification/
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
Malware writers have employed various obfuscation and polymorphism techniques to thwart static analysis approaches and bypassing antivirus tools. Dynamic analysis techniques, however, have essentially overcome these deceits by observing the actual behaviour of the code execution. In this regard, various methods, techniques and tools have been proposed. However, because of the diverse concepts and strategies used in the implementation of these methods and tools, security researchers and malware analysts find it difficult to select the required optimum tool to investigate the behaviour of a malware and to contain the associated risk for their study. Focusing on two dynamic analysis techniques: Function Call monitoring and Information Flow Tracking, this paper presents a comparison framework for dynamic malware analysis tools. The framework will assist the researchers and analysts to recognize the tool’s implementation strategy, analysis approach, system-wide analysis support and its overall handling of binaries, helping them to select a suitable and effective one for their study and analysis.
Malware Protection
Week5Part4-IS
Revision Fall2013
Malware Protection
Malware protection use to be known simply as virus protection. We have learned that
viruses are one form of malicious software and that a broader term to describe the
multitude of threats and the protection mechanism is needed. This is why the term
Malware is broader categorization of the threat and also the protection. Malware is a
portmanteau of the terms Malicious Software. Different malware protection packages
can cover a range of threats including viruses, worms, Trojans, spyware, adware, rootkits
to name a few.
As malware has evolved so has malware protection. Malware protection packages (MPP)
have evolved to provide more comprehensive protection mechanisms; including
firewalls, Intrusion Detection/Protection Systems (IDS/IPS), remote and central
management of system clusters, heterogeneous system protection and management,
signature and heuristic scanning, sandboxing to name just a few features.
It is important to understand that no one Malware Protection Package will find all pieces
of malware. Each package has its strengths and weaknesses. It is a good idea to always
have some form of malware protection running on your system in real time. However,
should you become infected it is useful to have an alternative strategy making use of
other scanners that you can run manually.
Free or Paid for Scanners
There is an adage that “you get what you pay for”. Generally this is true, but over time I
have found that there are some excellent free malware scanners that for single user
systems do a nice job. Some major requirements I have for a malware scanner are: it is
easy to run; does not require a lot of user interaction, uses little system resources, does a
good job finding and removing threats and automatically updates its signature database.
The following is not an endorsement for paid versus free scanners. It represents my
experiences for what they are worth.
I use to have a paid for Norton subscription. I found that over time the system footprint
for Norton grew which meant Norton required more CPU and overall system resources
for its real-time scanning processes. I think Norton has got better based on recent
experience I have with Windows 8 however at the time I had several performance
problems related to Norton. This got me to switch to free AVG. I used AVG for a while
and had real good luck, until AVG’s advertising got obnoxious. I decided to remove
AVG and found that process very difficult. I finally succeeded and then moved to using
free Avast. I have been using Avast for several years having very good luck.
I then started testing various malware scanners on virtual machines. This got me familiar
with Microsoft Security Essentials. This is a free product offered by Microsoft that nicely
integrates with Windows Vista and Windows 7 systems. I like the simplicity of its
inte ...
Abstract: The exponential growth of the internet and new technology lead today's world in a hectic situation both positive as well as the negative module. Cybercriminals gamble in the dark net using numerous techniques. This leads to cybercrime. Cyber threats like Malware attempt to infiltrate the computer or mobile device offline or internet, chat(online), and anyone can be a potential target. Malware is also known as malicious software is often used by cybercriminals to achieve their goal by tracking internet activity, capturing sensitive information, or blocking computer access. Reverse engineering is one of the best ways to prevent and is a powerful tool to keep the fight against cyber attacks. Most people in the cyber world see it as a black hat—It is said as being used to steal data and intellectual property. But when it is in the hands of cybersecurity experts, reverse engineering dons the white hat of the hero. Looking at the program from the outside in –often by a third party that had no hand in writing the code. It allows those who practice it to understand how a given program or system works when no source code is available. Reverse engineering accomplishing several tasks related to cybersecurity: finding system vulnerabilities, researching malware &analyzing the complexity of restoring core software algorithms that can further protect against theft. It is hard to hack certain software.
Keywords: Malware, threat, vulnerablity, detection, reverse engineering, analysis.
Title: Malware analysis and detection using reverse Engineering
Author: B.Rashmitha, J. Alwina Beauty Angelin, E.R. Ramesh
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Vol. 10, Issue 2, Month: April 2022 - June 2022
Page: (1-4)
Published Date: 01-April-2022
Research Publish Journals
Available at: www.researchpublish.com
You can Direct download full research paper at given below link:
https://www.researchpublish.com/papers/malware-analysis-and-detection-using-reverse-engineering
Academia Link: https://www.academia.edu/76069664/Malware_analysis_and_detection_using_reverse_Engineering_Available_at_www_researchpublish_com_journal_name_International_Journal_of_Computer_Science_and_Information_Technology_Research
Autonomic Anomaly Detection System in Computer Networksijsrd.com
This paper describes how you can protect your system from Intrusion, which is the method of Intrusion Prevention and Intrusion Detection .The underlying premise of our Intrusion detection system is to describe attack as instance of ontology and its first need is to detect attack. In this paper, we propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer networks. The framework holds potential for self-governing: self-labeling, self-updating and self-adapting. Our structure employs the Affinity Propagation (AP) algorithm to learn a subject’s behaviors through dynamical clustering of the streaming data. It automatically labels the data and adapts to normal behavior changes while identifies anomalies.
The Pros and Cons of Different Security Detection Technologies.pdfSecurityDetectionSol
we provide an overview of leading Security Detection Solutions and technologies and discuss their relative advantages to help inform organizations’ decisions.
a brief introduction of cyber war and its methods, may be called "cyber warfare introduction" . i have good knowledge on this domain and i practically follow this method. in this presentation i explain the reference 50% and it will complete on my next upload. please give your feedback if any suggestions to help me. thank you.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
2. INTRODUCTION
MOTIVATION
DETECTION TECHNIQUES
Signature Based
Anomaly Based
Specification Based
MALWARE OBFUSCATION
3. Malware
Malware, short for "malicious software," refers to a type of computer program designed
to infect a legitimate user's computer and inflict harm on it in multiple ways
Antimalware
Antimalware software protects against infections caused by many types of malware,
including viruses, worms, Trojan horses, rootkits, spyware, key
loggers, ransomware and adware.
Obfuscation
The obfuscation is a technique that makes programs harder to understand
4. Why do we need to study malwares ?
So are only the computers that can be affected ?
Wait
Does it look fake ?
Virus 666
US patent 6506148 B2
Why do we need antimalware's?
5.
6. Techniques used for detecting malware can be categorized broadly in to two
categories:
anomaly-based detection
and signature-based detection
An anomaly-based detection technique uses its knowledge of what constitutes
normal behavior to decide the maliciousness of a program under inspection
Specification-based techniques leverage some specification or rule set of what is valid
behavior in order to decide the maliciousness of a program under inspection
Signature-based detection uses its characterization of what is known to be
malicious to decide the maliciousness of a program under inspection
7. Static
Static analysis uses syntax or structural properties
A static approach attempts to detect malware before the program under inspection executes
Example strings utility (naïve way)
Dynamic
dynamic approach will leverage runtime information
a dynamic approach attempts to detect malicious behavior during program execution or after
program execution
Example Sysinternals suit (naïve way)
Hybrid
In this case, static and dynamic information is used to detect malware
8. What is a signature?
The signatures are typically hashes or byte-streams that are used to determine whether
a file or buffer contains a malicious payload
Hashes are generated using algorithms like CRC or MD5 which are typically fast and
can be calculated many times per second
This is most typical and preferred method employed by antimalware/antivirus
There is a tradeoff between being fast and being accurate
9. Byte-Streams
Simplest form of signatures
Signature is a byte-stream that is specific to a malware file and that does not normally
appear on non-malicious files
Example:- to detect the European Institute for Computer Anti-Virus Research (EICAR)
antivirus testing file, an antivirus engine may simply search for this entire string:
X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Easiest and fast approach for detection
Many robust and efficient algorithms are present for string matching
Example : Aho-Corasick, Knuth-Morris-Pratt, Boyer-Moore, etc.
This approach is error prone
10.
11. Checksums
The most typical signature-matching algorithm is used by almost all existing AV engines
and is based on calculating CRCs.
An antivirus engine may detect this testing file by calculating the CRC32 checksum of
the entire buffer against chunks of data or by analyzing the specific parts of a file format
that can be divided
Fast but a lot of false positives due to collisions
Use of modified CRC for detection. But still it gives false positioves
Example :
“petfood” and “eisenhower” have the same CRC32 hash 0xD0132158
Use of custom checksums
12. Cryptographic hashes
Follows the 3 main properties of cryptographic hash functions
Generates a “signature” that univocally identifies one buffer and just one buffer
Reduces false positives
More expensive than calculating a CRC32 hash
A single bit change may need to compute a new signature
They are used for recently discovered malwares that are considered critical. Meanwhile
stronger signature are being developed
13. The aim is to identify a whole family of malwares and reduce false positives
Fuzzy Hashing
Minimal or no diffusion at all
No confusion at all
A good collision rate (depends on application)
Some available hashes
Ssdeep, DeepToad, SpamSum etc.
False positives are possible but less compared to earlier discussed techniques
The are not used independently but used with some sophisticated techniques like
bloom filters
14. Bypassing such filters is not easy
Attacker needs to change many parts because changing just one bit will not work
The number of changes required to bypass the fuzzy signature depends on the
block size and how the block size is chosen
If block size depends on the size of given buffer and is not fixed then it is easier to
bypass
Fixed block size based fuzzy signatures are difficult to bypass
15. Graph-Based Hashes for Executables
Software program can be divided into two different kinds of graphs
Call graph – Directed graph showing the relationship between all the functions in the program
Flow graph- Directed graph showing the relationship between basic blocks
Antimalware's with code analysis engines may use signatures in the form of graphs
using information extracted from call graphs or the flow graphs
This approach is expensive but effective
For better performance limit to some instructions, basic blocks, time-outs
These techniques are powerful for the detection of the polymorphic viruses, while the
instructions will be different between different evolutions but the call graphs usually
remain stable.
16. False positive cases are still possible
Evasion techniques
Change the layout of the call graph
Implement anti-disassembly tricks
Mix anti-disassembly techniques with opaque predicates
Use time-out tricks (make the flow graph as complex as possible)
Example of control flow graph tool
http://github.com/joxeankoret/pyew
17. Dynamic signature-based detection is characterized by using solely information
gathered during the execution to decide its maliciousness
looks for patterns of behavior that would reveal the true malicious intent of a
program.
Signature-based method for worm detection that is based on known malicious
behaviors
A state transition based technique for detection
18. Uses static and dynamic properties to determine the maliciousness
First executes the program and then apply static signature detection
Example
Worm vs. Worm
Malicious Code Filter
19. Anomaly based detection usually occurs in two phases:
Training (learning) phase and
Detection (monitoring) phase
During the training phase the detector attempts to learn the normal behavior .
The detector could be learning the behavior of system, program or both
The key advantage of anomaly based detection is to detect zero-day attacks
Two fundamental problems associated with this approach are
High false alarm rate
Complexity of choosing the features to be learned in training phase
20. In dynamic anomaly-based detection, information gathered from the program’s
execution is used to detect malicious code
The detection phase monitors the program under inspection during its execution,
checking for inconsistencies with what was learned during the training phase
Examples
IDS, using computer forensic methods for Privacy-Invasive Software, monitoring system
call sequences, process call sequences
Setting a threshold is a challenging problem to reduce false positive cases
21. In static anomaly-based detection, characteristics about the file structure of the
program under inspection are used to detect malicious code
A key advantage of static anomaly based detection is that its use may make it
possible to detect malware without having to allow the malware carrying program
execute on the host system
Data-mining and machine learning approaches are used to detect the malwares
Hybrid anomaly based detection
22. Specification-based detection is a type of anomaly-based detection that tries to
address the typical high false alarm rate associated with most anomaly-based
detection techniques
Specification-based detection attempts to approximate the requirements for an
application or system
Training phase is the attainment of some rule set
The main limitation of specification-based detection is that it is often difficult to
specify completely and accurately the entire set of valid behaviors a system should
exhibit
23. Approaches classified as dynamic specification-based use behavior observed at
runtime to determine the maliciousness of an executable
Example
Monitoring Security-Critical Programs (using monitored system call events)
Using Dynamic Information Flow to Protect Applications
Process Behavior Monitoring
Using Instruction Block Signatures
24. Structural properties of programs are use for detection
Example
Static Detection of Malicious Code in Executables (API- graph)
Compiler Approach to Malcode Detection (certifying compiler)
Detecting Malcode in Firmware
Hybrid specification based detection
Example
26. Encryption
The first approach to evade the signature based antivirus scanners is to use encryption
Exclusive OR
Perform XOR operation with some byte
Base64 Encoding
Base64 is commonly used in malware to disguise text strings
ROT13
Rotate13 a simple letter substitution to jumble text
27. Code Packing
A packer is piece of software that takes the original malware file and compresses it
Dead-Code Insertion
Dead-code insertion is a simple technique that adds some ineffective instructions to a
program to change its appearance, but keep its behavior
Register Reassignment
Switches registers generation to generation while keeping program behavior same
Subroutine Reordering
Obfuscate an original code by changing the order of its subroutines in a random way.
Example Win32/Ghost
28. Instruction Substitution
Evolves an original code by replacing some instruction with other equivalent ones
Code Transposition
Code transposition reorders the sequence of the instructions of an original code without having any
impact on its behavior.
Code Integration
Introduced by the Win32/Zmist malware
Malware knits itself to the code of its target program
Decompile the target program into manageable objects , add itself between them and
reassembles the integrated code into a new generation.
29. Antivirus hackers handbook, Joxean Koret Elias Bachaalany, Willy Publication.
Practical Malware Analysis, Andrew Honig, No Starch Press.
Nwokedi Idika, Aditya P. Mathur, A Survey of Malware Detection Techniques,
Ilsun You , Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey , 2010 International Conference on
Broadband, Wireless Computing, Communication and Applications.
defcon-17-sean_taylor-binary_obfuscation.pdf, Defcon 02017.