SlideShare a Scribd company logo
Evasive Security Using ACLs on Threads
Using firewall-like rules to prevent malware
Saifur Rahman Mohsin
Executive
Raaj Construction
Trichy, Tamil Nadu, India
mohsin92@me.com
!!!Abstract— This document describes a new architecture for
security systems, which greatly improves system performance
and at the same time enforces veritable security to it.
Conventional anti-virus systems that exist in the market today
consume massive amount of memory (both physical as well as
permanent) and cannot be relied upon by power users who need
to tap into the full potential of their devices. Also, these systems
cannot be employed in thin clients, which have limitations in
quality and capacity of hardware. The document describes a
better architecture for the detection and prevention of malware
with an escalated improvement in overall performance of the
system. It also discusses new concepts that may be ported into
existing security systems to improve the efficiency of those
systems.
Index Terms—Computer Security, Just-in-time Detection,
Malware Prevention, Security Architecture
I. INTRODUCTION
Antivirus systems have been in use for a long time now
since the numbers of virus has been increasing in the past few
years. Different anti-virus systems provide a variety of
distinctive features that offer to make systems highly secure
from malware. However, the fundamental way they function is
always consistent. Conventional anti-viruses scan recursively
burrowing into file systems as well as connected peripherals
identifying files that contain malware signatures either in plain
text or obfuscated formats. The problem is that this process is
a high energy consuming process and also requires a bulk of
memory in order to function. These systems also require to be
updated frequently to update the malware definitions (i.e. the
signatures) of new malware that are created every hour.
This paper describes a more efficient architecture to
overcome the problems of the existing conventional systems.
This is done by looking at malware in their most primitive
form to understand the basic process that any malware involves
itself in--from hooking itself into the operating system to
executing stealthily. We also look at as how anti-virus systems
detect these malicious files so that we can create a more
intuitive and real-time system that handles malware effectively
before it attacks the system.
II. HOW VIRUSES WORK
Malware come in many different forms. It ranges from
commons viruses, to malicious scripts, worms, Trojans,
rootkits, etc. A virus is anything that can cause havoc to the
confidentiality, integrity or availability of a system.
Regardless of whether a given malware is a virus, worm, or
Trojan, it always requires a thread to execute. Like any
program, it consists of several code statements and also has a
single point of entry to execute. This means that like any
program, a virus requests the operating system for memory
and processor cycles (as shown in Fig. 1) to execute. It also
contains a process table and is associated with a Process ID
(pid) and handle ID.
Most viruses are targeted towards a certain kind of resource.
The intended resource may range from private information,
confidential data, illegal use of computational power, or even
to serve ads (in case of adware). The code that is written in a
virus program must be well hidden from the anti-virus system
as well as other programmers who might reverse engineer the
code for their own deeds. A good virus therefore is encrypted
in a format that makes it hard for anti-virus systems to neither
detect nor reverse engineering to be feasible. This process is
known as obfuscation and most good viruses that are existent
today are well obfuscated.
!In addition to obfuscation, most viruses are attached to
legitimate files so that they are more concealed. There is a
higher chance of a virus being installed as a sub component of
an infected program rather than as an individual program
itself. This ensures that the virus program does not appear to
be malicious thereby preventing anti-virus (AV) systems to
flag it. Such a program that is highly invisible to an AV is
considered to be Fully UnDetectable (FUD). There are several
FUD viruses in existence today. These are no longer just
Fig. 1. How a process begins to execute
146
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in
targeted towards computers but are aimed towards national
infrastructure like power grids, nuclear plants, automation
plants, etc. Therefore, the conventional AV systems do not
provide the necessary security that is required and hence we
must look for better solutions.
Our goal is to develop such a system and which detects and
informs the end user about the existence of these new threads
(or processes) which the user never intended to execute. A
user may decide whether he really wants to execute a given
process and the system can mark these choices as trusted
processes (in a similar fashion as websites are marked as
trusted by firewalls and browsers). Everything else can be
blocked (these will include the threads created by malicious
programs), as it seems as an unnecessary overhead for the
system to execute these processes regardless of whether these
are malicious or not.
III. HOW ANTI-VIRUS SOFTWARE WORKS
There are several AVs available in the market today. A lot of
them offer special features, which have a certain edge over
other systems. Regardless of these features, a typical AV
system consists of few common components – A database of
virus signatures, a scanner and few auxiliary modules to make
it easy for the user to customize the way the AV system
behaves. A definition repository (a file or database) contains
several code signatures that may be used to identify if a file is
infected / infectious. These signatures need to be frequently
updated as time progresses and new viruses are manufactured
every hour. This becomes an overhead to the user to update
the system every now and then. Also, the AV system tends to
become larger and larger as time progresses due to the
vastness of the definition file and the enormity of the new
signatures that keep getting added. To complicate this further,
the AV system itself contains a scanner module, which sweeps
through the file system, testing each file if it may contain plain
text or obfuscated forms of the virus signature. The entire
search process requires a substantial amount of memory and
slows down the overall performance of the system. It has been
observed that a system is much faster when an AV system is
not present than otherwise.
Thus, it is possible to conclude that an anti-virus system,
which uses the conventional architecture, cannot be a real-
time system and the success rate and efficiency depends on the
number of virus signatures present as well as the kind of
obfuscation algorithms that it can detect. Our goal is to
describe a better architecture that prevents this overhead and
also serves a higher success rate. Such a system is described in
the next section.
IV. THE IMPROVED ARCHITECTURE
It has already been described in Section II that any malware
requires a space in the process table in order to run and
therefore has an entry point. Exploiting this fact, we can
design an architecture that ensures that each process that starts
must be filtered using a set of rules that can be pre-defined as
well as user-defined. This is very much alike to the system
used by “firewalls”--where a list is used to decide whether a
website / hostname must be blocked or allowed. Such a list
specifies the limitation of the access and is known as an
Access Control List (ACL). We implement this concept into
anti-virus detection systems to realize a more effective
architecture.
The efficiency of this lies in the fact that there is no
scanning mechanism to search for viruses. Instead, the
detection is done just at the moment a program requests the
OS (As shown in Fig. 2) to provide resources for it. This
means that we are performing a Just-In-Time Detection (JIT-
D) and that is why this architecture is more effective
compared to the existing ones that are in use today.
In order to increase the efficiency much further, we need
not rescan a process if it has already been scanned. However,
this causes a risk because a user may decide to update the clean
file with a malicious one. For this reason, we take the hash of
the file contents and store it in the ACL along with the process
name. There is no need to store the path as the hash ensures
that a particular file is always uniquely identified. Every time
the process starts our system will ensure that the present hash is
identical to the stored hash in ACL. If so, it will not scan the
file. If not, it should scan the file as it has been altered. This
technique is highly effective because it is extremely difficult
even for any skilled programmer to write a malware program
whose hash value exactly coincides with an existing program.
V. ACCESS CONTROL LISTS
ACLs have been in use in operating systems for decades.
They are generally used to specify file rights to provide
authority for who has access to a particular file. An ACL may
be a simple text file that contains mappings of process names
along with their permissions and hashes.
Processes that start are first checked as to whether an entry
for the process exists in the ACL. If it does, then it is checked
whether it has been modified using the computed hash. If it
does not match, the anti-malware system is invoked to process
the initiated process and determine whether it is safe to
execute or not.
We use a standard hash like MD5 or SHA-1 to uniquely
identify the file. The reason being that some files tend to
change when a user updates the file by replacing it. The
architecture explained her strongly enforces that files /
Fig. 2. How the proposed system intervenes process startup
147
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in
programs need not be processed unless its data has been
modified. Hence, by using a computed hash we can easily
detect changes.
An ACL therefore contains program names, their computed
hashes and the access levels. If upon execution of a new
process, the process exists in ACL and is marked as a blocked
process then the system prevents the execution of the process
(See Fig. 3) and this prevents malicious code from infecting the
system.
VI. JUST-IN-TIME DETECTION
It has already been well explained in Section III that most
AVs are pretty slow. They not only take a lot of time to run but
also consumes a large amount of physical memory. This
causes a lot of lag in other programs and slows down the
overall performance of the system.
By detecting the processes exactly at the time of their
execution, we remove the need for a scanner to traverse
through the hard drives as well as connected peripherals. It
enables the program to run at a very low memory cost and high
efficiency with momentary bursts of memory usage when a
process is caught. We call this technique as Just-in-time
detection simply because it detects just before the time of
execution. This means that it is absolutely allowed for a
malicious file to sit in a hard drive as long as it’s not harmful.
The moment it is executed, our system kicks in to prevent it
from causing harm to the system.
VII. IMPLEMENTATION
Using C# an implementation was made using the Diagnosis
namespace in the .NET framework to intercept process
initiation. By suspending the thread until the process
completes, it was possible to prevent the system to get
infected in processing time itself. Also, it was identified that
this architecture is self-preserving as it prevented even the
ACLs to be directly modified by a process. The
implementation was targeted towards the Windows operating
system, as it is the most widely used system and has more
viruses when compared to other systems. An analysis was also
taken (As shown in Fig. 4) which determined that our system
was highly efficient in memory consumption as it was
comparatively nothing to other AV systems or even other
programs. Hence, it was determined that this architecture is
the best approach for malware prevention as it saves a lot of
resources.
REFERENCES
1. Fred B. Schneider, Cornell University “Least Privilege and
More” [IEEE Computer Society 1540-7993/03, 2003].
2. "Managing Authorization and Access Control". Microsoft
Technet. 2005-11-03. Retrieved 2013-04-08.
3. Cynthia E. Irvine, Naval Postgraduate School “Teaching
Constructive Security” [IEEE Computer Society 1540-7993/03,
2003 under Security & Privacy].
4. "Access Control Lists". MSDN Library. 2012-10-26. Retrieved
2013-04-08.
5. Elias Levy, Architect & former CTO, Symantec “Approaching
Zero” [IEEE Computer Society 1540-7993, 2003 under Attack
Trends, 2004].

Fig. 4. Memory usage statistics of the proposed system against other
applications—browser and another AV system
Fig. 3. How the proposed system blocks malicious processes
148
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
ISBN : 378 - 26 - 138420 - 6
www.iaetsd.in

More Related Content

What's hot

Ransomware Threats to the Healthcare Industry
Ransomware Threats to the Healthcare IndustryRansomware Threats to the Healthcare Industry
Ransomware Threats to the Healthcare Industry
Tim Gurganus
 
Remote File Inclusion
Remote File InclusionRemote File Inclusion
Remote File Inclusion
Imperva
 
DeepContentInspection Lato
DeepContentInspection LatoDeepContentInspection Lato
DeepContentInspection Lato
Brian Stoner
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
Mountain States Engineering and Controls
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
 
Kali linux useful tools
Kali linux useful toolsKali linux useful tools
Kali linux useful tools
milad mahdavi
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
OPSWAT
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
IJNSA Journal
 
Antivirus engine
Antivirus engineAntivirus engine
Antivirus engine
soran computer institute
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
richarddxd
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
Fathoni Mahardika II
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
Ghazanfar Latif (Gabe)
 
Current Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master Copy
Tommie Walls
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
culltdueet65
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
Dedi Dwianto
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
Mustafa YÜKSEL
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
Pradeepkrajyaguru
 

What's hot (17)

Ransomware Threats to the Healthcare Industry
Ransomware Threats to the Healthcare IndustryRansomware Threats to the Healthcare Industry
Ransomware Threats to the Healthcare Industry
 
Remote File Inclusion
Remote File InclusionRemote File Inclusion
Remote File Inclusion
 
DeepContentInspection Lato
DeepContentInspection LatoDeepContentInspection Lato
DeepContentInspection Lato
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Kali linux useful tools
Kali linux useful toolsKali linux useful tools
Kali linux useful tools
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
Antivirus engine
Antivirus engineAntivirus engine
Antivirus engine
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Current Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master Copy
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 

Viewers also liked

1 energia en_el_hogar_modif
1 energia en_el_hogar_modif1 energia en_el_hogar_modif
1 energia en_el_hogar_modif
camilo981404
 
Ahmed_Adel_Alsharnouby
Ahmed_Adel_AlsharnoubyAhmed_Adel_Alsharnouby
Ahmed_Adel_Alsharnouby
Ahmed Alsharnouby
 
Capitalización
CapitalizaciónCapitalización
Capitalización
candykellys
 
Grupo #2 concepto de informatica. de computadora programas basicos dispositiv...
Grupo #2 concepto de informatica. de computadora programas basicos dispositiv...Grupo #2 concepto de informatica. de computadora programas basicos dispositiv...
Grupo #2 concepto de informatica. de computadora programas basicos dispositiv...
Eduardo Rambay
 
Syllabus informatica1
Syllabus informatica1Syllabus informatica1
Syllabus informatica1
Eduardo Rambay
 
Development
Development Development
Development
George Boatfield
 
Proyectos inegrados normal superior
Proyectos inegrados normal superiorProyectos inegrados normal superior
Proyectos inegrados normal superior
fgx
 
РДБ для району
РДБ  для районуРДБ  для району
РДБ для району
hzinchenko69
 
Roderick Derks - eBook De werkplek van de toekomst
Roderick Derks - eBook De werkplek van de toekomstRoderick Derks - eBook De werkplek van de toekomst
Roderick Derks - eBook De werkplek van de toekomstRoderick Derks
 
Comercio
ComercioComercio
Comercio
turmavocacional
 
Trocas e devoluçoes
Trocas e devoluçoesTrocas e devoluçoes
Trocas e devoluçoes
turmavocacional
 
VI CURSO “TÉCNICAS MODERNAS DE DOCUMENTOS DE ARCHIVO” “CONSERVACIÓN DE DOCUME...
VI CURSO “TÉCNICAS MODERNAS DE DOCUMENTOS DE ARCHIVO” “CONSERVACIÓN DE DOCUME...VI CURSO “TÉCNICAS MODERNAS DE DOCUMENTOS DE ARCHIVO” “CONSERVACIÓN DE DOCUME...
VI CURSO “TÉCNICAS MODERNAS DE DOCUMENTOS DE ARCHIVO” “CONSERVACIÓN DE DOCUME...
abamp
 
Group Cycloid
Group CycloidGroup Cycloid
Group Cycloid
Cycloid 3
 

Viewers also liked (14)

1 energia en_el_hogar_modif
1 energia en_el_hogar_modif1 energia en_el_hogar_modif
1 energia en_el_hogar_modif
 
Ahmed_Adel_Alsharnouby
Ahmed_Adel_AlsharnoubyAhmed_Adel_Alsharnouby
Ahmed_Adel_Alsharnouby
 
dossierartistesnam
dossierartistesnamdossierartistesnam
dossierartistesnam
 
Capitalización
CapitalizaciónCapitalización
Capitalización
 
Grupo #2 concepto de informatica. de computadora programas basicos dispositiv...
Grupo #2 concepto de informatica. de computadora programas basicos dispositiv...Grupo #2 concepto de informatica. de computadora programas basicos dispositiv...
Grupo #2 concepto de informatica. de computadora programas basicos dispositiv...
 
Syllabus informatica1
Syllabus informatica1Syllabus informatica1
Syllabus informatica1
 
Development
Development Development
Development
 
Proyectos inegrados normal superior
Proyectos inegrados normal superiorProyectos inegrados normal superior
Proyectos inegrados normal superior
 
РДБ для району
РДБ  для районуРДБ  для району
РДБ для району
 
Roderick Derks - eBook De werkplek van de toekomst
Roderick Derks - eBook De werkplek van de toekomstRoderick Derks - eBook De werkplek van de toekomst
Roderick Derks - eBook De werkplek van de toekomst
 
Comercio
ComercioComercio
Comercio
 
Trocas e devoluçoes
Trocas e devoluçoesTrocas e devoluçoes
Trocas e devoluçoes
 
VI CURSO “TÉCNICAS MODERNAS DE DOCUMENTOS DE ARCHIVO” “CONSERVACIÓN DE DOCUME...
VI CURSO “TÉCNICAS MODERNAS DE DOCUMENTOS DE ARCHIVO” “CONSERVACIÓN DE DOCUME...VI CURSO “TÉCNICAS MODERNAS DE DOCUMENTOS DE ARCHIVO” “CONSERVACIÓN DE DOCUME...
VI CURSO “TÉCNICAS MODERNAS DE DOCUMENTOS DE ARCHIVO” “CONSERVACIÓN DE DOCUME...
 
Group Cycloid
Group CycloidGroup Cycloid
Group Cycloid
 

Similar to Iaetsd evasive security using ac ls on threads

A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
UltraUploader
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
Casey Wimmer
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic Analysis
Ahmed Banafa
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
SecPod Technologies
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
infantsuk
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET Journal
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
Chandrashekhar B
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
Abhijeet Karve
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
UltraUploader
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
Aryan G
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
tafinley
 
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemSelf Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
IJRES Journal
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
AjayKumar73315
 
Security Software
Security SoftwareSecurity Software
Security Software
bennybigbang
 
Whitelist Tutorial 1
Whitelist Tutorial 1Whitelist Tutorial 1
Whitelist Tutorial 1
tafinley
 
13 essential log_col_infog
13 essential log_col_infog13 essential log_col_infog
13 essential log_col_infog
huynhvanphuc
 
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf20 Trip-Wire-.pdf
20 Trip-Wire-.pdf
G Srinu
 
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf20 Trip-Wire-.pdf
20 Trip-Wire-.pdf
G Srinu
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Enchaning system effiency through process scanning
Enchaning system effiency through process scanningEnchaning system effiency through process scanning
Enchaning system effiency through process scanning
sai kiran
 

Similar to Iaetsd evasive security using ac ls on threads (20)

A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic Analysis
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
 
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference SystemSelf Evolving Antivirus Based on Neuro-Fuzzy Inference System
Self Evolving Antivirus Based on Neuro-Fuzzy Inference System
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Whitelist Tutorial 1
Whitelist Tutorial 1Whitelist Tutorial 1
Whitelist Tutorial 1
 
13 essential log_col_infog
13 essential log_col_infog13 essential log_col_infog
13 essential log_col_infog
 
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf20 Trip-Wire-.pdf
20 Trip-Wire-.pdf
 
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf20 Trip-Wire-.pdf
20 Trip-Wire-.pdf
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
Enchaning system effiency through process scanning
Enchaning system effiency through process scanningEnchaning system effiency through process scanning
Enchaning system effiency through process scanning
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
Iaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
GiselleginaGloria
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
Sou Tibon
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
EMERSON EDUARDO RODRIGUES
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
GOKULKANNANMMECLECTC
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
supriyaDicholkar1
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
Kuvempu University
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 

Recently uploaded (20)

DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 

Iaetsd evasive security using ac ls on threads

  • 1. Evasive Security Using ACLs on Threads Using firewall-like rules to prevent malware Saifur Rahman Mohsin Executive Raaj Construction Trichy, Tamil Nadu, India mohsin92@me.com !!!Abstract— This document describes a new architecture for security systems, which greatly improves system performance and at the same time enforces veritable security to it. Conventional anti-virus systems that exist in the market today consume massive amount of memory (both physical as well as permanent) and cannot be relied upon by power users who need to tap into the full potential of their devices. Also, these systems cannot be employed in thin clients, which have limitations in quality and capacity of hardware. The document describes a better architecture for the detection and prevention of malware with an escalated improvement in overall performance of the system. It also discusses new concepts that may be ported into existing security systems to improve the efficiency of those systems. Index Terms—Computer Security, Just-in-time Detection, Malware Prevention, Security Architecture I. INTRODUCTION Antivirus systems have been in use for a long time now since the numbers of virus has been increasing in the past few years. Different anti-virus systems provide a variety of distinctive features that offer to make systems highly secure from malware. However, the fundamental way they function is always consistent. Conventional anti-viruses scan recursively burrowing into file systems as well as connected peripherals identifying files that contain malware signatures either in plain text or obfuscated formats. The problem is that this process is a high energy consuming process and also requires a bulk of memory in order to function. These systems also require to be updated frequently to update the malware definitions (i.e. the signatures) of new malware that are created every hour. This paper describes a more efficient architecture to overcome the problems of the existing conventional systems. This is done by looking at malware in their most primitive form to understand the basic process that any malware involves itself in--from hooking itself into the operating system to executing stealthily. We also look at as how anti-virus systems detect these malicious files so that we can create a more intuitive and real-time system that handles malware effectively before it attacks the system. II. HOW VIRUSES WORK Malware come in many different forms. It ranges from commons viruses, to malicious scripts, worms, Trojans, rootkits, etc. A virus is anything that can cause havoc to the confidentiality, integrity or availability of a system. Regardless of whether a given malware is a virus, worm, or Trojan, it always requires a thread to execute. Like any program, it consists of several code statements and also has a single point of entry to execute. This means that like any program, a virus requests the operating system for memory and processor cycles (as shown in Fig. 1) to execute. It also contains a process table and is associated with a Process ID (pid) and handle ID. Most viruses are targeted towards a certain kind of resource. The intended resource may range from private information, confidential data, illegal use of computational power, or even to serve ads (in case of adware). The code that is written in a virus program must be well hidden from the anti-virus system as well as other programmers who might reverse engineer the code for their own deeds. A good virus therefore is encrypted in a format that makes it hard for anti-virus systems to neither detect nor reverse engineering to be feasible. This process is known as obfuscation and most good viruses that are existent today are well obfuscated. !In addition to obfuscation, most viruses are attached to legitimate files so that they are more concealed. There is a higher chance of a virus being installed as a sub component of an infected program rather than as an individual program itself. This ensures that the virus program does not appear to be malicious thereby preventing anti-virus (AV) systems to flag it. Such a program that is highly invisible to an AV is considered to be Fully UnDetectable (FUD). There are several FUD viruses in existence today. These are no longer just Fig. 1. How a process begins to execute 146 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH ISBN : 378 - 26 - 138420 - 6 www.iaetsd.in
  • 2. targeted towards computers but are aimed towards national infrastructure like power grids, nuclear plants, automation plants, etc. Therefore, the conventional AV systems do not provide the necessary security that is required and hence we must look for better solutions. Our goal is to develop such a system and which detects and informs the end user about the existence of these new threads (or processes) which the user never intended to execute. A user may decide whether he really wants to execute a given process and the system can mark these choices as trusted processes (in a similar fashion as websites are marked as trusted by firewalls and browsers). Everything else can be blocked (these will include the threads created by malicious programs), as it seems as an unnecessary overhead for the system to execute these processes regardless of whether these are malicious or not. III. HOW ANTI-VIRUS SOFTWARE WORKS There are several AVs available in the market today. A lot of them offer special features, which have a certain edge over other systems. Regardless of these features, a typical AV system consists of few common components – A database of virus signatures, a scanner and few auxiliary modules to make it easy for the user to customize the way the AV system behaves. A definition repository (a file or database) contains several code signatures that may be used to identify if a file is infected / infectious. These signatures need to be frequently updated as time progresses and new viruses are manufactured every hour. This becomes an overhead to the user to update the system every now and then. Also, the AV system tends to become larger and larger as time progresses due to the vastness of the definition file and the enormity of the new signatures that keep getting added. To complicate this further, the AV system itself contains a scanner module, which sweeps through the file system, testing each file if it may contain plain text or obfuscated forms of the virus signature. The entire search process requires a substantial amount of memory and slows down the overall performance of the system. It has been observed that a system is much faster when an AV system is not present than otherwise. Thus, it is possible to conclude that an anti-virus system, which uses the conventional architecture, cannot be a real- time system and the success rate and efficiency depends on the number of virus signatures present as well as the kind of obfuscation algorithms that it can detect. Our goal is to describe a better architecture that prevents this overhead and also serves a higher success rate. Such a system is described in the next section. IV. THE IMPROVED ARCHITECTURE It has already been described in Section II that any malware requires a space in the process table in order to run and therefore has an entry point. Exploiting this fact, we can design an architecture that ensures that each process that starts must be filtered using a set of rules that can be pre-defined as well as user-defined. This is very much alike to the system used by “firewalls”--where a list is used to decide whether a website / hostname must be blocked or allowed. Such a list specifies the limitation of the access and is known as an Access Control List (ACL). We implement this concept into anti-virus detection systems to realize a more effective architecture. The efficiency of this lies in the fact that there is no scanning mechanism to search for viruses. Instead, the detection is done just at the moment a program requests the OS (As shown in Fig. 2) to provide resources for it. This means that we are performing a Just-In-Time Detection (JIT- D) and that is why this architecture is more effective compared to the existing ones that are in use today. In order to increase the efficiency much further, we need not rescan a process if it has already been scanned. However, this causes a risk because a user may decide to update the clean file with a malicious one. For this reason, we take the hash of the file contents and store it in the ACL along with the process name. There is no need to store the path as the hash ensures that a particular file is always uniquely identified. Every time the process starts our system will ensure that the present hash is identical to the stored hash in ACL. If so, it will not scan the file. If not, it should scan the file as it has been altered. This technique is highly effective because it is extremely difficult even for any skilled programmer to write a malware program whose hash value exactly coincides with an existing program. V. ACCESS CONTROL LISTS ACLs have been in use in operating systems for decades. They are generally used to specify file rights to provide authority for who has access to a particular file. An ACL may be a simple text file that contains mappings of process names along with their permissions and hashes. Processes that start are first checked as to whether an entry for the process exists in the ACL. If it does, then it is checked whether it has been modified using the computed hash. If it does not match, the anti-malware system is invoked to process the initiated process and determine whether it is safe to execute or not. We use a standard hash like MD5 or SHA-1 to uniquely identify the file. The reason being that some files tend to change when a user updates the file by replacing it. The architecture explained her strongly enforces that files / Fig. 2. How the proposed system intervenes process startup 147 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH ISBN : 378 - 26 - 138420 - 6 www.iaetsd.in
  • 3. programs need not be processed unless its data has been modified. Hence, by using a computed hash we can easily detect changes. An ACL therefore contains program names, their computed hashes and the access levels. If upon execution of a new process, the process exists in ACL and is marked as a blocked process then the system prevents the execution of the process (See Fig. 3) and this prevents malicious code from infecting the system. VI. JUST-IN-TIME DETECTION It has already been well explained in Section III that most AVs are pretty slow. They not only take a lot of time to run but also consumes a large amount of physical memory. This causes a lot of lag in other programs and slows down the overall performance of the system. By detecting the processes exactly at the time of their execution, we remove the need for a scanner to traverse through the hard drives as well as connected peripherals. It enables the program to run at a very low memory cost and high efficiency with momentary bursts of memory usage when a process is caught. We call this technique as Just-in-time detection simply because it detects just before the time of execution. This means that it is absolutely allowed for a malicious file to sit in a hard drive as long as it’s not harmful. The moment it is executed, our system kicks in to prevent it from causing harm to the system. VII. IMPLEMENTATION Using C# an implementation was made using the Diagnosis namespace in the .NET framework to intercept process initiation. By suspending the thread until the process completes, it was possible to prevent the system to get infected in processing time itself. Also, it was identified that this architecture is self-preserving as it prevented even the ACLs to be directly modified by a process. The implementation was targeted towards the Windows operating system, as it is the most widely used system and has more viruses when compared to other systems. An analysis was also taken (As shown in Fig. 4) which determined that our system was highly efficient in memory consumption as it was comparatively nothing to other AV systems or even other programs. Hence, it was determined that this architecture is the best approach for malware prevention as it saves a lot of resources. REFERENCES 1. Fred B. Schneider, Cornell University “Least Privilege and More” [IEEE Computer Society 1540-7993/03, 2003]. 2. "Managing Authorization and Access Control". Microsoft Technet. 2005-11-03. Retrieved 2013-04-08. 3. Cynthia E. Irvine, Naval Postgraduate School “Teaching Constructive Security” [IEEE Computer Society 1540-7993/03, 2003 under Security & Privacy]. 4. "Access Control Lists". MSDN Library. 2012-10-26. Retrieved 2013-04-08. 5. Elias Levy, Architect & former CTO, Symantec “Approaching Zero” [IEEE Computer Society 1540-7993, 2003 under Attack Trends, 2004].
 Fig. 4. Memory usage statistics of the proposed system against other applications—browser and another AV system Fig. 3. How the proposed system blocks malicious processes 148 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH ISBN : 378 - 26 - 138420 - 6 www.iaetsd.in