【24h】

Bee Master: Detecting Host-Based Code Injection Attacks

机译:蜜蜂大师:检测基于主机的代码注入攻击

获取原文

摘要

A technique commonly used by malware for hiding on a targeted system is the host-based code injection attack. It allows malware to execute its code in a foreign process space enabling it to operate covertly and access critical information of other processes. Since there exists a plethora of different ways for injecting and executing code in a foreign process space, a generic approach spanning all these possibilities is needed. Approaches just focussing on low-level operating system details (e.g. API hooking) do not suffice since the suspicious API set is constantly extended. Thus, approaches focussing on low level operating system details are prone to miss novel attacks. Furthermore, such approaches are restricted to intimate knowledge of exactly one operating system. In this paper, we present Bee Master, a novel approach for detecting host-based code injection attacks. Bee Master applies the honeypot paradigm to OS processes and by that it does not rely on low-level OS details. The basic idea is to expose regular OS processes as a decoy to malware. Our approach focuses on concepts - such as threads or memory pages - present in every modern operating system. Therefore, Bee Master does not suffer from the drawbacks of low-level OS-based approaches. Furthermore, it allows OS independent detection of host-based code injection attacks. To test the capabilities of our approach, we evaluated Bee Master qualitatively and quantitatively on Microsoft Windows and Linux. The results show that it reaches reliable and robust detection for various current malware families.
机译:恶意软件用于隐藏目标系统的恶意软件的技术是基于主机的代码注入攻击。它允许恶意软件在外部进程空间中执行其代码,使其能够封闭并访问其他进程的关键信息。由于存在在外部处理空间中注入和执行代码的多种不同方式,因此需要一种跨越所有这些可能性的通用方法。由于可疑API集不断扩展,因此仅关注低级操作系统详细信息(例如API挂钩)的方法。因此,关注低级操作系统细节的方法易于错过小说攻击。此外,这些方法仅限于恰好了解一个操作系统的私密知识。在本文中,我们提出了一种用于检测基于主机的码注射攻击的新方法。 Bee Master将蜜罐PARADIGM应用于OS流程,并不依赖于低级操作系统详细信息。基本思想是将常规操作系统进程视为恶意软件的诱饵。我们的方法侧重于概念 - 例如在每个现代操作系统中存在的线程或内存页面。因此,蜜蜂大师不会遭受基于低水平的OS方法的缺点。此外,它允许OS独立检测基于主机的代码注入攻击。要测试我们方法的功能,我们在Microsoft Windows和Linux上定性和定量评估了BEE主人。结果表明,它对各种当前恶意软件系列达到可靠和鲁棒的检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号