首页> 外文OA文献 >Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware
【2h】

Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware

机译:恶意软件的自动行为分析 - WannaCry案例研究   勒索

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Ransomware, a class of self-propagating malware that uses encryption to holdthe victims' data ransom, has emerged in recent years as one of the mostdangerous cyber threats, with widespread damage; e.g., zero-day ransomwareWannaCry has caused world-wide catastrophe, from knocking U.K. National HealthService hospitals offline to shutting down a Honda Motor Company in Japan[1].Our close collaboration with security operations of large enterprises revealsthat defense against ransomware relies on tedious analysis from high-volumesystems logs of the first few infections. Sandbox analysis of freshly capturedmalware is also commonplace in operation. We introduce a method to identify and rank the most discriminating ransomwarefeatures from a set of ambient (non-attack) system logs and at least one logstream containing both ambient and ransomware behavior. These ranked featuresreveal a set of malware actions that are produced automatically from systemlogs, and can help automate tedious manual analysis. We test our approach usingWannaCry and two polymorphic samples by producing logs with Cuckoo Sandboxduring both ambient, and ambient plus ransomware executions. Our goal is toextract the features of the malware from the logs with only knowledge thatmalware was present. We compare outputs with a detailed analysis of WannaCryallowing validation of the algorithm's feature extraction and provide analysisof the method's robustness to variations of input data\textemdash changingquality/quantity of ambient data and testing polymorphic ransomware. Mostnotably, our patterns are accurate and unwavering when generated frompolymorphic WannaCry copies, on which 63 (of 63 tested) anti-virus (AV)products fail.
机译:勒索软件是一类自我传播的恶意软件,它使用加密来保存受害者的数据勒索,近年来已成为最危险的网络威胁之一,造成了广泛的破坏。例如,零日勒索软件WannaCry造成了全球性的灾难,从使英国国家健康服务部医院脱机到关闭日本的本田汽车公司[1]。我们与大型企业的安全运营密切合作表明,针对勒索软件的防御依赖于繁琐的分析从前几次感染的大容量系统日志中获取。刚捕获的恶意软件的沙箱分析在操作中也很常见。我们介绍了一种从一组环境(非攻击)系统日志和至少一个同时包含环境和勒索软件行为的日志流中识别和排名最具区别的勒索软件功能的方法。这些排名的功能揭示了从系统日志自动生成的一组恶意软件操作,可以帮助自动进行繁琐的手动分析。我们通过在环境环境,环境环境以及勒索软件执行期间使用Cuckoo Sandbox生成日志,使用WannaCry和两个多态样本测试了我们的方法。我们的目标是仅在知道存在恶意软件的情况下从日志中提取恶意软件的功能。我们将输出与WannaCryallowing的详细分析进行比较,以验证算法的特征提取,并分析该方法对输入数据的变化的稳健性\ textemdash更改环境数据的质量/数量并测试多态勒索软件。最值得注意的是,当从多态WannaCry副本生成时,我们的模式是准确且坚定不移的,其中63种(测试的63种)抗病毒(AV)产品失败。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号