Detecting disguised processes using Application-Behaviour Profiling

In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. The...

Full description

Bibliographic Details
Main Authors: Vaas, C, Happa, J
Format: Conference item
Published: Institute of Electrical and Electronics Engineers 2017
_version_ 1797055865567576064
author Vaas, C
Happa, J
author_facet Vaas, C
Happa, J
author_sort Vaas, C
collection OXFORD
description In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. They also have the shortcoming that they need to be updated frequently to possess the latest malware definitions. This makes them inherently prone to missing novel attack techniques. Misuse detection IDSs however overcome this problem by maintaining a ground truth of normal application behavior while reporting deviations as anomalies. In our approach, we try to accomplish this by observing a process’ memory consumption. This is for two reasons: We expect the readings to be less volatile in comparison to for instance network operations. Second, by breaking the problem down, we are able to investigate thoroughly while still laying the foundations for future expansion. We use the observations from a given host to train a machine learning algorithm. After an initial learning phase, we evaluate the model with readings from the application it has been trained on and other applications in order to assess its quality. Our results indicate that the efficacy of this method is highly dependent on parametrizing the machine learning algorithm appropriately. A large variance in accuracy with only slightly altered inputs confirms this suggestion. We finish with a discussion on deploying such an IDS at scale in a realistic scenario.
first_indexed 2024-03-06T19:15:22Z
format Conference item
id oxford-uuid:182a0454-a300-4d0e-b696-0cfde33c3569
institution University of Oxford
last_indexed 2024-03-06T19:15:22Z
publishDate 2017
publisher Institute of Electrical and Electronics Engineers
record_format dspace
spelling oxford-uuid:182a0454-a300-4d0e-b696-0cfde33c35692022-03-26T10:41:49ZDetecting disguised processes using Application-Behaviour ProfilingConference itemhttp://purl.org/coar/resource_type/c_5794uuid:182a0454-a300-4d0e-b696-0cfde33c3569Symplectic Elements at OxfordInstitute of Electrical and Electronics Engineers2017Vaas, CHappa, JIn order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. They also have the shortcoming that they need to be updated frequently to possess the latest malware definitions. This makes them inherently prone to missing novel attack techniques. Misuse detection IDSs however overcome this problem by maintaining a ground truth of normal application behavior while reporting deviations as anomalies. In our approach, we try to accomplish this by observing a process’ memory consumption. This is for two reasons: We expect the readings to be less volatile in comparison to for instance network operations. Second, by breaking the problem down, we are able to investigate thoroughly while still laying the foundations for future expansion. We use the observations from a given host to train a machine learning algorithm. After an initial learning phase, we evaluate the model with readings from the application it has been trained on and other applications in order to assess its quality. Our results indicate that the efficacy of this method is highly dependent on parametrizing the machine learning algorithm appropriately. A large variance in accuracy with only slightly altered inputs confirms this suggestion. We finish with a discussion on deploying such an IDS at scale in a realistic scenario.
spellingShingle Vaas, C
Happa, J
Detecting disguised processes using Application-Behaviour Profiling
title Detecting disguised processes using Application-Behaviour Profiling
title_full Detecting disguised processes using Application-Behaviour Profiling
title_fullStr Detecting disguised processes using Application-Behaviour Profiling
title_full_unstemmed Detecting disguised processes using Application-Behaviour Profiling
title_short Detecting disguised processes using Application-Behaviour Profiling
title_sort detecting disguised processes using application behaviour profiling
work_keys_str_mv AT vaasc detectingdisguisedprocessesusingapplicationbehaviourprofiling
AT happaj detectingdisguisedprocessesusingapplicationbehaviourprofiling