Evasive Malware Detection Using Groups of Processes - Archive ouverte HAL Access content directly
Conference Papers Year : 2017

Evasive Malware Detection Using Groups of Processes

(1, 2) , (1, 3) , (1, 2) , (2)
1
2
3

Abstract

Fueled by a recent boost in revenue, cybercriminals are developing increasingly sophisticated and advanced malicious applications. This new generation of malware is able to avoid most of the existing detection methods. Even behavioral detection solutions are no longer immune to evasion, mostly because existing solutions focus on the actions or characteristics of a single process. We propose shifting the focus from malware as a single component to a more accurate perspective of malware as multi-component systems. We propose a dynamic behavioral detection solution that identifies groups of related processes, analyzes the actions performed by processes in these groups using behavioral heuristics and evaluates their behavior such that even evasive, multiprocess malware can be detected. Using the information provided by groups of processes, once a malware has been detected, a more comprehensive system cleanup can be performed, to ensure that all traces of an attack have been removed and the system is no longer at risk.
Fichier principal
Vignette du fichier
449885_1_En_3_Chapter.pdf (228.87 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01649019 , version 1 (27-11-2017)

Licence

Attribution - CC BY 4.0

Identifiers

Cite

Gheorghe Hăjmăşan, Alexandra Mondoc, Radu Portase, Octavian Creţ. Evasive Malware Detection Using Groups of Processes. 32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.32-45, ⟨10.1007/978-3-319-58469-0_3⟩. ⟨hal-01649019⟩
95 View
83 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More