Extending Detection with Forensic Information

03/31/2016
by   Z. Berkay Celik, et al.
0

For over a quarter century, security-relevant detection has been driven by models learned from input features collected from real or simulated environments. An artifact (e.g., network event, potential malware sample, suspicious email) is deemed malicious or non-malicious based on its similarity to the learned model at run-time. However, the training of the models has been historically limited to only those features available at run time. In this paper, we consider an alternate model construction approach that trains models using forensic "privileged" information--features available at training time but not at runtime--to improve the accuracy and resilience of detection systems. In particular, we adapt and extend recent advances in knowledge transfer, model influence, and distillation to enable the use of forensic data in a range of security domains. Our empirical study shows that privileged information increases detection precision and recall over a system with no privileged information: we observe up to 7.7 error for fast-flux bot detection, 8.6 malware classification, and 16.9 limitations and applications of different privileged information techniques in detection systems. Such techniques open the door to systems that can integrate forensic data directly into detection models, and therein provide a means to fully exploit the information available about past security-relevant events.

READ FULL TEXT
research
03/22/2023

A survey of hardware-based malware detection approach

Malware is the most significant threat to computer security. This paper ...
research
05/25/2020

Malware Detection at the Microarchitecture Level using Machine Learning Techniques

Detection of malware cyber-attacks at the processor microarchitecture le...
research
02/07/2019

Dual-task agent for run-time classification and killing of malicious processes

Malicious software (malware) is one of the key vectors for cyber crimina...
research
03/30/2021

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

In recent years malware has become increasingly sophisticated and diffic...
research
04/03/2019

Group-wise classification approach to improve Android malicious apps detection accuracy

In the fast-growing smart devices, Android is the most popular OS, and d...
research
12/27/2021

PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

Recent self-propagating malware (SPM) campaigns compromised hundred of t...
research
06/06/2011

Using More Data to Speed-up Training Time

In many recent applications, data is plentiful. By now, we have a rather...

Please sign up or login with your details

Forgot password? Click here to reset