Dual-task agent for run-time classification and killing of malicious processes

02/07/2019
by   Matilda Rhode, et al.
0

Malicious software (malware) is one of the key vectors for cyber criminal activity. New malware samples appear every minute. These new samples are distinct from previous examples because the precise file content is new though the software behaviour may not be new. For this reason, static detection methods perform poorly by comparison with methods using behavioural data. Behavioural analysis, however, is typically conducted in a sandboxed or emulated environment. The sandbox takes several minutes to analyse the file, whilst static detection takes seconds. Some malware behaves one way in a sandbox and differently on a target endpoint, risking the sample being be misclassified. Run-time malware analysis examines software behaviour as it executes on the target endpoint. This eliminates the time delay caused by sandbox analysis and ensures that the behaviour monitored is identical to the behaviour on the target endpoint.Malicious software is capable of causing damage within seconds of delivery, only an automated response is capable of acting quickly enough to mitigate its impact. Previous run-time detection research has not considered real damage prevention to the endpoint.This paper proposes an agent for earlier run-time detection and killing of malware than has previously been presented. The agent uses a dual-task recurrent neural network trained both to maximise classification accuracy and to exercise caution in killing processes, as the latter action is irreversible. Real-time testing of the model found that it was able to detect 90 encryption within 30 seconds of launching) and reduce the number of files encrypted in the first 30 seconds by 50

READ FULL TEXT
research
06/28/2018

Robust Neural Malware Detection Models for Emulation Sequence Learning

Malicious software, or malware, presents a continuously evolving challen...
research
03/30/2021

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

In recent years malware has become increasingly sophisticated and diffic...
research
06/10/2019

SCGDet: Malware Detection using Semantic Features Based on Reachability Relation

Recently, with the booming development of software industry, more and mo...
research
03/31/2016

Extending Detection with Forensic Information

For over a quarter century, security-relevant detection has been driven ...
research
05/15/2019

SMART: Semantic Malware Attribute Relevance Tagging

With the rapid proliferation and increased sophistication of malicious s...
research
12/07/2022

RADAR: Effective Network-based Malware Detection based on the MITRE ATT CK Framework

MITRE ATT CK is a widespread ontology that specifies tactics, techniqu...
research
07/27/2019

Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge

Malware writers frequently try to hide the activities of their agents wi...

Please sign up or login with your details

Forgot password? Click here to reset