首页> 外文会议>IEEE International Symposium on Cyberspace Safety and Security >Prison: Tracking Process Interactions to Contain Malware
【24h】

Prison: Tracking Process Interactions to Contain Malware

机译:监狱:跟踪流程交互以包含恶意软件

获取原文

摘要

Modern operating systems provide a number of different mechanisms that allow processes to interact. These interactions can generally be divided into two classes: inter-process communication techniques, which a process supports to provide services to its clients, and injection methods, which allow a process to inject code or data directly into another process' address space. Operating systems support these mechanisms to enable better performance and to provide simple and elegant software development APIs that promote cooperation between processes. Unfortunately, process interaction channels introduce problems at the end-host that are related to malware containment and the attribution of malicious actions. In particular, host-based security systems rely on process isolation to detect and contain malware. However, interaction mechanisms allow malware to manipulate a trusted process to carry out malicious actions on its behalf. In this case, existing security products will typically either ignore the actions or mistakenly attribute them to the trusted process. For example, a host-based security tool might be configured to deny untrusted processes from accessing the network, but malware could circumvent this policy by abusing a (trusted) web browser to get access to the Internet. In short, an effective host-based security solution must monitor and take into account interactions between processes. In this paper, we present PRISON, a system that tracks process interactions and prevents malware from leveraging benign programs to fulfill its malicious intent. To this end, an operating system kernel extension monitors the various system services that enable processes to interact, and the system analyzes the calls to determine whether or not the interaction should be allowed. PRISON can be deployed as an online system for tracking and containing malicious process interactions to effectively mitigate the threat of malware. The system can also be used as a dynamic analysis tool to aid an analyst in understanding a malware sample's effect on its environment.
机译:现代操作系统提供了许多不同的机制,允许进程进行交互。这些交互通常可以分为两个类:过程间通信技术,该过程支持到其客户端提供服务,以及注入方法,允许进程将代码或数据直接注入另一个进程的地址空间。操作系统支持这些机制,以实现更好的性能,并提供简单而优雅的软件开发API,可促进流程之间的合作。不幸的是,过程交互频道在与恶意软件密封和恶意操作的归属相关的最终主机中引入问题。特别是,基于主机的安全系统依赖于进程隔离来检测和包含恶意软件。但是,交互机制允许恶意软件操纵可信的过程,以代表其进行恶意行为。在这种情况下,现有的安全产品通常将忽略操作或错误地将它们归因于可信进程。例如,基于主机的安全工具可以被配置为拒绝不受信任的进程访问网络,但恶意软件可以通过滥用(可信)的Web浏览器来获取访问Internet的访问来规避此策略。简而言之,基于有效的基于主机的安全解决方案必须监视并考虑进程之间的交互。在本文中,我们展示了监狱,这是一种跟踪流程交互的系统,并防止恶意软件利用良性计划来实现其恶意的意图。为此,操作系统内核扩展监视启用进程交互的各种系统服务,系统分析呼叫以确定是否应该允许交互。监狱可以作为在线系统部署,用于跟踪和包含恶意流程交互,以有效减轻恶意软件的威胁。该系统还可以用作动态分析工具,以帮助分析师了解恶意软件样本对其环境的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号