Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

03/30/2021
by   Dorel Yaffe, et al.
0

In recent years malware has become increasingly sophisticated and difficult to detect prior to exploitation. While there are plenty of approaches to malware detection, they all have shortcomings when it comes to identifying malware correctly prior to exploitation. The trade-off is usually between false positives, causing overhead, preventing normal usage and the risk of letting the malware execute and cause damage to the target. We present a novel end-to-end solution for in-memory malicious activity detection done prior to exploitation by leveraging machine learning capabilities based on data from unique run-time logs, which are carefully curated in order to detect malicious activity in the memory of protected processes. This solution achieves reduced overhead and false positives as well as deployment simplicity. We implemented our solution for Windows-based systems, employing multi disciplinary knowledge from malware research, machine learning, and operating system internals. Our experimental evaluation yielded promising results. As we expect future sophisticated malware may try to bypass it, we also discuss how our solution can be extended to thwart such bypassing attempts.

READ FULL TEXT
research
06/10/2019

SCGDet: Malware Detection using Semantic Features Based on Reachability Relation

Recently, with the booming development of software industry, more and mo...
research
10/17/2019

Heterogeneous Graph Matching Networks

Information systems have widely been the target of malware attacks. Trad...
research
02/07/2019

Dual-task agent for run-time classification and killing of malicious processes

Malicious software (malware) is one of the key vectors for cyber crimina...
research
12/03/2018

Malware static analysis and DDoS capabilities detection

The present thesis addresses the topic of denial of service capabilities...
research
03/31/2016

Extending Detection with Forensic Information

For over a quarter century, security-relevant detection has been driven ...
research
04/23/2019

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware

PowerShell is nowadays a widely-used technology to administrate and mana...
research
03/31/2022

Ransomware Detection using Process Memory

Ransomware attacks have increased significantly in recent years, causing...

Please sign up or login with your details

Forgot password? Click here to reset