Deep Program Reidentification: A Graph Neural Network Solution

12/10/2018
by   Shen Wang, et al.
0

Program or process is an integral part of almost every IT/OT system. Can we trust the identity/ID (e.g., executable name) of the program? To avoid detection, malware may disguise itself using the ID of a legitimate program, and a system tool (e.g., PowerShell) used by the attackers may have the fake ID of another common software, which is less sensitive. However, existing intrusion detection techniques often overlook this critical program reidentification problem (i.e., checking the program's identity). In this paper, we propose an attentional multi-channel graph neural network model (DeepRe-ID) to verify the program's identity based on its system behaviors. The key idea is to leverage the representation learning of the program behavior graph to guide the reidentification process. We formulate the program reidentification as a graph classification problem and develop an effective multi-channel attentional graph embedding algorithm to solve it. Extensive experiments --- using real-world enterprise monitoring data and real attacks --- demonstrate the effectiveness of DeepRe-ID across multiple popular metrics and the robustness to the normal dynamic changes like program version upgrades.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/18/2020

GRAPHSPY: Fused Program Semantic-Level Embedding via Graph Neural Networks for Dead Store Detection

Production software oftentimes suffers from the issue of performance ine...
research
06/13/2018

Android Malware Detection using Large-scale Network Representation Learning

With the growth of mobile devices and applications, the number of malici...
research
03/05/2021

NF-GNN: Network Flow Graph Neural Networks for Malware Detection and Classification

Malicious software (malware) poses an increasing threat to the security ...
research
04/14/2021

Identity Inference on Blockchain using Graph Neural Network

The anonymity of blockchain has accelerated the growth of illegal activi...
research
06/25/2018

Person Re-Identification in Identity Regression Space

Most existing person re-identification (re-id) methods are unsuitable fo...
research
07/30/2021

Unveiling the potential of Graph Neural Networks for robust Intrusion Detection

The last few years have seen an increasing wave of attacks with serious ...
research
03/24/2018

Extended Abstract: Mimicry Resilient Program Behavior Modeling with LSTM based Branch Models

In the software design, protecting a computer system from a plethora of ...

Please sign up or login with your details

Forgot password? Click here to reset