首页> 外文期刊>Digital investigation >Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor
【24h】

Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor

机译:利用虚拟机自检和内存取证,使用虚拟机监控程序上的机器学习技术检测和表征未知恶意软件

获取原文
获取原文并翻译 | 示例
       

摘要

The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM security solution that detects malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS). Specifically, it functions by the Virtual Machine Monitor (VMM), or hypervisor. The reconstructed semantic details obtained by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, the existing out-of-VM security solutions require extensive manual analysis. In this paper, we propose an advanced VMM-based, guest-assisted Automated Internal-and-External (A-IntExt) introspection system by leveraging VMI, Memory Forensics Analysis (MFA), and machine learning techniques at the hypervisor. Further, we use the VMI-based technique to introspect digital artifacts of the live guest OS to obtain a semantic view of the processes details. We implemented an Intelligent Cross View Analyzer (ICVA) and implanted it into our proposed A-IntExt system, which examines the data supplied by the VMI to detect hidden, dead, and dubious processes, while also predicting early symptoms of malware execution on the introspected guest OS in a timely manner. Machine learning techniques are used to analyze the executables that are mined and extracted using MFA-based techniques and ascertain the malicious executables. The practicality of the A-IntExt system is evaluated by executing large real-world malware and benign executables onto the live guest OSs. The evaluation results achieved 99.55% accuracy and 0.004 False Positive Rate (FPR) on the 10-fold cross-validation to detect unknown malware on the generated dataset. Additionally, the proposed system was validated against other benchmarked malware datasets and the A-IntExt system outperforms the detection of real-world malware at the VMM with performance exceeding 6.3%. (c) 2017 Elsevier Ltd. All rights reserved.
机译:虚拟机自检(VMI)已成为一种细粒度的VM外安全解决方案,可通过自检和重建实时来宾操作系统(OS)的易失性内存状态来检测恶意软件。具体来说,它由虚拟机监视器(VMM)或系统管理程序运行。在管理程序中,可以通过良性和恶意状态的组合获得由VMI获取的重构语义细节。为了区分这两种状态,现有的VM外安全解决方案需要大量的手动分析。在本文中,我们通过在管理程序中利用VMI,内存取证分析(MFA)和机器学习技术,提出了一种基于VMM的高级,来宾辅助的自动内部和外部(A-IntExt)自省系统。此外,我们使用基于VMI的技术对实时来宾OS的数字工件进行内省,以获得流程细节的语义视图。我们实施了智能交叉视图分析器(ICVA),并将其植入到我们提议的A-IntExt系统中,该系统检查VMI提供的数据以检测隐藏,死机和可疑的进程,同时还可以预测内省的恶意软件执行的早期症状。来宾操作系统及时。机器学习技术用于分析使用基于MFA的技术挖掘和提取的可执行文件,并确定恶意可执行文件。 A-IntExt系统的实用性是通过在实时来宾OS上执行大型的实际恶意软件和良性可执行文件来评估的。评估结果在10倍交叉验证中达到了99.55%的准确度和0.004误报率(FPR),可在生成的数据集上检测未知恶意软件。此外,该提议的系统还针对其他基准恶意软件数据集进行了验证,并且A-IntExt系统在VMM上的性能优于6.3%,优于VMM上的实际恶意软件检测。 (c)2017 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号