首页> 外文会议>International Conference on Science of Cyber Security >Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection
【24h】

Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection

机译:自动赎金瓶行为分析:模式提取和早期检测

获取原文

摘要

Security operation centers (SOCs) typically use a variety of tools to collect large volumes of host logs for detection and forensic of intrusions. Our experience, supported by recent user studies on SOC operators, indicates that operators spend ample time (e.g., hundreds of man hours) on investigations into logs seeking adversarial actions. Similarly, reconfiguration of tools to adapt detectors for future similar attacks is commonplace upon gaining novel insights (e.g., through internal investigation or shared indicators). This paper presents an automated malware pattern-extraction and early detection tool, testing three machine learning approaches: TF-IDF (term frequency-inverse document frequency), Fisher's LDA (linear discriminant analysis) and ET (extra trees/extremely randomized trees) that can (1) analyze freshly discovered malware samples in sandboxes and generate dynamic analysis reports (host logs); (2) automatically extract the sequence of events induced by malware given a large volume of ambient (un-attacked) host logs, and the relatively few logs from hosts that are infected with potentially polymorphic malware; (3) rank the most discriminating features (unique patterns) of malware and from the behavior learned detect malicious activity, and (4) allows operators to visualize the discriminating features and their correlations to facilitate malware forensic efforts. To validate the accuracy and efficiency of our tool, we design three experiments and test seven ransomware attacks (i.e., WannaCry, DBGer, Cerber, Defray, GandCrab, Locky, and nRansom). The experimental results show that TF-IDF is the best of the three methods to identify discriminating features, and ET is the most time-efficient and robust approach.
机译:安全操作中心(SOC)通常使用多种工具来收集大量主机的日志,用于检测和入侵取证。我们的经验,通过对SOC运营商最近的用户研究的支持,表明运营商花费足够的时间(例如,数百个工时)在调查日志寻求敌对行动。同样,重新配置的工具来适应检测器,用于未来的类似的攻击是在获得了新的见解(例如,通过内部调查或共用的指标)是常见的。本文提出一种自动化的恶意软件图案提取和早期检测工具,测试3个机器学习方法:TF-IDF(词频 - 逆文档频率),Fisher的LDA(线性鉴别分析)和ET(额外树木/极其随机树木),该可以(1)分析沙箱新鲜发现恶意软件样本并生成动态分析报告(主机日志); (2)自动提取诱导给定的恶意软件的大量环境(未攻击)主机登录的,并且从该被感染的潜在多态性恶意软件的主机的相对少的日志中的事件序列; (3)等级的恶意软件,并从行为是最挑剔的特点(独特模式)了解到检测恶意行为,以及(4)允许运营商以可视化的识别特征和它们之间的关系,以促进恶意软件取证工作。为了验证我们的工具的精度和效率,我们设计了三种实验和测试7勒索攻击(即WannaCry,DBGer,CERBER,支付,GandCrab,Locky和nRansom)。实验结果表明,TF-IDF是最好的三种方法来识别识别功能,并且ET是最花时间的有效和可靠的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号