首页> 外文期刊>Computers & Security >Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud
【24h】

Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud

机译:使用MinHash方法进行易失性内存分析,可有效,安全地检测私有云中的恶意软件

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Today, most organizations employ cloud computing environments for both computational reasons and for storing their critical files and data. Virtual servers are an example of widely used virtual resources provided by cloud computing architecture. Therefore, virtual servers are considered an attractive target for cyber-attackers, who launch their attacks by malware such as the well-known remote access trojans (RATs) and more modern malware such as ransomware and cryptojacking. Existing security solutions implemented on virtual servers fail to detect these newly created malware (zero-day attacks). In fact, by the time the security solution is updated, the organization has likely already been attacked. In this study, we present a designated framework aimed at trusted and secured detection of newly created and unknown instances of malware on virtual machines in an organization's private cloud. We took volatile memory dumps from a virtual machine (VM) in a secured and trusted manner, and analyzed all of the data within the memory dumps using the MinHash method; MinHash is well suited for the accurate detection of malware in VMs based on efficient volatile memory dump comparisons. The proposed framework is evaluated in a comprehensive set of experiments of increasing difficulty in which we also measured the detection performance of different classifiers (both similarity and machine learning-based classifiers, using collections of real-world, professional, notorious malware and legitimate applications. The evaluation results show that our framework can detect the anomalous state of a virtual server, as well as known, new, and unknown malware, with very high TPRs (100% for ransomware and RATs) and very low FPRs (1.8% for ransomware and no FPR for RATs). We also show how the methodology's performance can be improved, in terms of required time and storage space, saving more than 86% of these resources. Finally, we demonstrate the generalization capabilities and practicality of our methodology by using transfer learning and learning from just one virtual server in order to detect unknown malware on a different virtual server. (C) 2019 Elsevier Ltd. All rights reserved.
机译:如今,大多数组织出于计算原因以及存储其关键文件和数据而采用云计算环境。虚拟服务器是云计算架构提供的广泛使用的虚拟资源的示例。因此,虚拟服务器被认为是网络攻击者的诱人目标,网络攻击者通过诸如著名的远程访问木马(RAT)之类的恶意软件和诸如勒索软件和加密劫持之类的更现代的恶意软件来发起攻击。在虚拟服务器上实施的现有安全解决方案无法检测到这些新创建的恶意软件(零日攻击)。实际上,在安全解决方案更新时,该组织可能已经受到攻击。在这项研究中,我们提出了一个指定的框架,该框架旨在可信任和安全地检测组织的私有云中虚拟机上新创建和未知的恶意软件实例。我们以安全可靠的方式从虚拟机(VM)提取了易失性内存转储,并使用MinHash方法分析了内存转储中的所有数据。 MinHash非常适合基于有效的易失性内存转储比较来准确检测VM中的恶意软件。在一组难度不断增加的综合实验中对提出的框架进行了评估,其中我们还使用真实,专业,臭名昭著的恶意软件和合法应用程序的集合,测量了不同分类器(相似性和基于机器学习的分类器)的检测性能。评估结果表明,我们的框架可以检测虚拟服务器的异常状态,以及已知,新的和未知的恶意软件,具有很高的TPR(对于勒索软件和RAT为100%)和非常低的FPR(对于勒索软件和RAT为1.8%)。我们还展示了如何在所需的时间和存储空间方面改善方法的性能,从而节省了超过86%的资源,最后,我们通过转移证明了方法的泛化能力和实用性(c)2019 Elsevier Ltd.保留所有权利并仅从一台虚拟服务器中学习以检测另一台虚拟服务器上的未知恶意软件d。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号