【24h】

LLR-Based Sentiment Analysis for Kernel Event Sequences

机译:基于LLR的内核事件序列情感分析

获取原文

摘要

Behavior-based analysis of dynamically executed binaries has become a widely used technique for the identification of suspected malware. Most solutions rely on function call patterns to determine whether a sample is exhibiting malicious behavior. These system and API calls are usually regarded individually and do not consider contextual information or process inter-dependencies. In addition, the patterns are often fixed in nature and do not adapt to changing circumstances on the system environment level. To address these shortcomings, this paper proposes a sentiment extraction and scoring system capable of learning the maliciousness inherent to n-grams of kernel events captured by a real-time monitoring agent. The approach is based on calculating the log likelihood ratio (LLR) of all identified n-grams, effectively determining neighboring sequences as well as assessing whether certain event combinations incline towards the benign or malicious. The extraction component automatically compiles a WordNet-like sentiment dictionary of events, which is subsequently used to score unknown traces of either individual processes, or a session in its entirety. The system was evaluated using a large set of real-world event traces collected on live corporate workstations as well as raw API call traces created in a dedicated malware analysis environment. While applicable to both scenarios, the introduced solution performed best for our abstracted kernel events, generating both new insight into malware–system interaction and assisting with the scoring of hitherto unknown application behavior.
机译:基于行为的动态执行二进制文件分析已成为识别可疑恶意软件的一种广泛使用的技术。大多数解决方案都依赖于函数调用模式来确定样本是否表现出恶意行为。这些系统和API调用通常被单独考虑,并且不考虑上下文信息或过程之间的相互依赖性。此外,这些模式通常本质上是固定的,不适应系统环境级别上不断变化的情况。为了解决这些缺点,本文提出了一种情绪提取和评分系统,该系统能够了解实时监控代理捕获的n克内核事件固有的恶意。该方法基于计算所有识别出的n-gram的对数似然比(LLR),有效地确定相邻序列以及评估某些事件组合是趋于良性还是恶意的。提取组件会自动编译类似WordNet的事件情感词典,随后将其用于对单个进程或整个会话的未知痕迹进行评分。使用在实时公司工作站上收集的大量现实事件跟踪以及在专用恶意软件分析环境中创建的原始API调用跟踪对系统进行了评估。虽然适用于这两种情况,但引入的解决方案对于抽象内核事件的执行效果最佳,不仅可以生成对恶意软件与系统交互的新见解,而且可以对迄今为止未知的应用程序行为进行评分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号