Detecting disguised processes using Application-Behaviour Profiling
In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. The...
Main Authors: | , |
---|---|
Format: | Conference item |
Published: |
Institute of Electrical and Electronics Engineers
2017
|
_version_ | 1797055865567576064 |
---|---|
author | Vaas, C Happa, J |
author_facet | Vaas, C Happa, J |
author_sort | Vaas, C |
collection | OXFORD |
description | In order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. They also have the shortcoming that they need to be updated frequently to possess the latest malware definitions. This makes them inherently prone to missing novel attack techniques. Misuse detection IDSs however overcome this problem by maintaining a ground truth of normal application behavior while reporting deviations as anomalies. In our approach, we try to accomplish this by observing a process’ memory consumption. This is for two reasons: We expect the readings to be less volatile in comparison to for instance network operations. Second, by breaking the problem down, we are able to investigate thoroughly while still laying the foundations for future expansion. We use the observations from a given host to train a machine learning algorithm. After an initial learning phase, we evaluate the model with readings from the application it has been trained on and other applications in order to assess its quality. Our results indicate that the efficacy of this method is highly dependent on parametrizing the machine learning algorithm appropriately. A large variance in accuracy with only slightly altered inputs confirms this suggestion. We finish with a discussion on deploying such an IDS at scale in a realistic scenario. |
first_indexed | 2024-03-06T19:15:22Z |
format | Conference item |
id | oxford-uuid:182a0454-a300-4d0e-b696-0cfde33c3569 |
institution | University of Oxford |
last_indexed | 2024-03-06T19:15:22Z |
publishDate | 2017 |
publisher | Institute of Electrical and Electronics Engineers |
record_format | dspace |
spelling | oxford-uuid:182a0454-a300-4d0e-b696-0cfde33c35692022-03-26T10:41:49ZDetecting disguised processes using Application-Behaviour ProfilingConference itemhttp://purl.org/coar/resource_type/c_5794uuid:182a0454-a300-4d0e-b696-0cfde33c3569Symplectic Elements at OxfordInstitute of Electrical and Electronics Engineers2017Vaas, CHappa, JIn order to avoid detection, malware can disguise itself as a legitimate program or hijack system processes to reach its goals. Commonly used signature-based Intrusion Detection Systems (IDS) struggle to distinguish between these processes and are thus only of limited use to detect such attacks. They also have the shortcoming that they need to be updated frequently to possess the latest malware definitions. This makes them inherently prone to missing novel attack techniques. Misuse detection IDSs however overcome this problem by maintaining a ground truth of normal application behavior while reporting deviations as anomalies. In our approach, we try to accomplish this by observing a process’ memory consumption. This is for two reasons: We expect the readings to be less volatile in comparison to for instance network operations. Second, by breaking the problem down, we are able to investigate thoroughly while still laying the foundations for future expansion. We use the observations from a given host to train a machine learning algorithm. After an initial learning phase, we evaluate the model with readings from the application it has been trained on and other applications in order to assess its quality. Our results indicate that the efficacy of this method is highly dependent on parametrizing the machine learning algorithm appropriately. A large variance in accuracy with only slightly altered inputs confirms this suggestion. We finish with a discussion on deploying such an IDS at scale in a realistic scenario. |
spellingShingle | Vaas, C Happa, J Detecting disguised processes using Application-Behaviour Profiling |
title | Detecting disguised processes using Application-Behaviour Profiling |
title_full | Detecting disguised processes using Application-Behaviour Profiling |
title_fullStr | Detecting disguised processes using Application-Behaviour Profiling |
title_full_unstemmed | Detecting disguised processes using Application-Behaviour Profiling |
title_short | Detecting disguised processes using Application-Behaviour Profiling |
title_sort | detecting disguised processes using application behaviour profiling |
work_keys_str_mv | AT vaasc detectingdisguisedprocessesusingapplicationbehaviourprofiling AT happaj detectingdisguisedprocessesusingapplicationbehaviourprofiling |