SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. VI (Nov – Dec. 2015), PP 01-07
www.iosrjournals.org
DOI: 10.9790/0661-17660107 www.iosrjournals.org 1 | Page
Novel Malware Clustering System Based on Kernel Data
Structure
Bhandare Trupti Vasantrao1
, Pramod B. Mali2
1
PG Student, Department of Computer Engineering, Smt. Kashibai Navale College of Engineering, Vadgaon Bk,
Pune, India
2
Assistant Professor, Department of Computer Engineering, Smt. Kashibai Navale College of Engineering,
Vadgaon Bk, Pune, India
Abstract : An operating system kernel is the prime of system software, responsible for the integrity and
conventional computer system’s operations. Traditional malware detection approaches have based on the code-
centric aspects of malicious programs, e.g. injection of unauthorized code or the control flow patterns of
malware programs.
In response to these malware detection strategies, modern malware focus on advanced techniques such
as reusing existing code or complicated malware code to circumvent detection. A new perspective is introduced
to detect malware which is different from code-centric approaches. The data centric malware defense
architecture (DMDA) is introduced which models and detects malware behavior. This architecture is based on
properties of the kernel data objects that are targeted during malware attacks. This architecture requires
external monitoring. External monitor resides outside the monitored kernel and ensures temper-resistance. This
architecture consists of three core system components that enable inspection of the kernel data properties and
depending upon these properties from malware cluster. The system clusters malware depending upon the kernel
data objects.
Keywords: Kernel data structure, malware signature, malware clustering, kernel malware classification.
I. Introduction
An operating system kernel is the core of system software which is responsible for the integrity and
operations of a conventional computer system. Developers of malicious software (malware) have been
continuously exploring various attack vectors to tamper with the kernel. Traditional malware detection
approaches have focused on the code centric aspects of malicious programs, such as the injection of
unauthorized code or the control flow patterns of malware programs. However, in response to these malware
detection strategies, modern malware is employing advanced techniques such as reusing existing code or
complicated malware code to circumvent detection.
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so
there is an urgent need for its detection. The most popular detection approach is misuse-based detection.
However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and
obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not
rely on the specific features of malware.
Modern malware use a variety of techniques to cause divergence in the attacked program’s behaviour
and achieve the attacker’s goal. Traditional malicious programs such as computer viruses, worms, and exploits
have been using code injection attacks which inject malicious code into a program to perform a nefarious
function. Intrusion detection approaches based on such code properties effectively detect or prevent this class of
malware attacks [10], [11], [12].
Data-centric approaches require neither the detection of code injection nor malicious code patterns.
Therefore they are not directly subvertible using code reuse or obfuscation techniques. However, detecting
malware based on data modifications has a unique challenge that makes it distinct from code based approaches.
Unlike code, which is typically expected to be invariant, data status can be dynamic. Correspondingly,
conventional integrity checking cannot be applied to data properties. In addition, monitoring data objects of an
operating system (OS) kernel has additional challenges because an OS may be the lowest software layer in
conventional computing environments, meaning that there is no monitoring layer below it.
Traditional malware detection and analysis approaches have been focusing on code-centric aspects of
malicious programs, such as detection of the injection of malicious code or matching malicious code sequences.
However, modern malware has been employing advanced strategies, such as reusing legitimate code or
complicated malware code to circumvent the detection. As a new perspective to complement code-centric
approaches, we propose a data-centric OS kernel malware characterization architecture that detects and
characterizes malware attacks based on the properties of data objects manipulated during the attacks [1].
Novel Malware Clustering System Based on Kernel Data Structure
DOI: 10.9790/0661-17660107 www.iosrjournals.org 2 | Page
To address the challenges of relying on only code in malware defence, we propose new approaches
based on the properties of data objects that are targeted in malware attacks. These approaches do not require the
detection of the injected code or the specific sequence of malicious code. Therefore, they are not directly subject
to attacks targeting the approaches based on code properties.
II. Literature Survey
Data invariants are one important class of integrity properties that concerns the expected values of
program variables (other integrity properties include control flow integrity and information flow integrity).
Since the behaviour of a program can largely depend on its variables, manipulation of data has been an
important malware attack technique.
Malicious code or malware has long been recognized as the major threat to the computing world [7].
According to Mohamad Fadli and Aman Jantan, all malware have their specific objective and target, but the
main purpose is to create threats to the data network and computer operation [8]. In general, incoming files are
considered as malware if they perform suspicious attack and might harm computer systems. These files can
break into vulnerable systems from many ways such as via internet (HTTP), email, removable media, Peer-2-
Peer (P2P) and Instant Messaging (IM). Anti-malware products in host machine will perform scanning process
to detect and identify the attack. If unknown kinds of attack are found, the samples will be sent to anti-malware
vendors to be analyzed. Once analysis process is completed, vendors will update the virus signature database
server and the latest update can be downloaded from host machine side. Classification part will classify the
attack sample into the correct malware classes and prediction as well as removal part will remove, clean or
quarantine the attacks.
Many malware detection mechanisms rely on the properties of malware code such as the injection of
unauthorized code [7][14] and the patterns of malicious code sequences [8][9]. While these approaches are
effective for classic malware, emerging malicious programs are introducing advanced techniques such as
return/jump oriented programming [4][15][16], code obfuscation [17], and code emulation [18] to elude those
malware detection mechanisms. In this paper, we have presented a new approach for detecting kernel malware
based on the properties of kernel data objects.
Compared to dynamic kernel objects, static objects have memory addresses that are predetermined at
the compilation time. The manipulation of static objects is observed as write accesses to their unique addresses.
If such memory access patterns are observed specifically during malware execution, they are extracted as
malware signatures. For example, system call hijacking is implemented as the manipulation of the system call
table that is a static object. The manipulation of this object by other than the legitimate initialization code is rare
in benign execution. Thus, this attack pattern is automatically extracted as a signature.
III. Proposed System
We present a novel scheme that addresses these challenges and enables OS kernel malware detection
approaches based on kernel data properties. The monitoring system should be designed in a way that cannot
directly be altered by potentially malicious code therefore; we use an external monitor to observe the target OS
kernel. An external monitor has a challenging task in identifying the data object information of the monitored
kernel, which is known as a semantic gap. Such information should be reconstructed externally in the monitor.
We propose a classification approach for identification of the malware characterization over kernel data
structure and clustering using data object properties to detect kernel malware, which consists of two main
components.
The first component is a kernel object mapping system that externally identifies the dynamic kernel
objects of the monitored OS kernel at runtime, and our aim is to observe memory accesses to kernel data
objects. This component is essential because it enables an external monitor to recognize the data objects that are
targeted by the accesses. As well as being an infrastructure to recognize data objects, this system provides
effective applications such as the detection of data hiding kernel malware attacks and the analysis of malware
behavior targeting dynamic kernel objects.
In addition to the kernel data mapping system, we propose a new approach that detects malware by
matching memory access patterns that specifically occur during malware attacks. Dynamic kernel analysis can
produce effective malware signatures that can suppress frequent false positives in typical workloads by
extracting malware memory reference patterns specific to malware attacks.
IV. System Implementation
This section describes the system designs in the form system architecture, modules. It is also explain
the software and hardware requirement to perform the system execution.
Novel Malware Clustering System Based on Kernel Data Structure
DOI: 10.9790/0661-17660107 www.iosrjournals.org 3 | Page
4.1 System Architecture
We first present how we can generate the data information and present our approach to characterize
malware based on kernel data patterns. In this paper we propose identification of the malware characterization
over kernel data structure, which models and detects malware behavior using the properties of kernel data
objects.
Fig. 4.1: Architecture Design Identification of the Malware Characterization
4.2 System Modules
Based on the design architecture in Fig. 4.1 it has two modules:
1. Malware Signature Generation
2. Malware Detection
4.2.1 Malware Signature Generation
This module works on the collected kernel information data from the kernel behavior on different type
of system activities. The collected information is cleaned using a data cleaning mechanism to remove the noise
information and run a rule-based classification approach to generate an activities based signature patterns known
as data behavior pattern (DBP). A signature generally is a pattern of instruction sequence or system calls
sequence performed for executing or completing a job. The generated activity signature patterns are stored for
runtime testing.
To generate a malware signature for a malicious kernel run j with malware M, we apply set operations
on n malicious kernel runs and m kind runs as follows.
 Let’s assume DM, j, and DB,k → represents a data behavior profile for a kind of kernel execution k, and
SM is called a data behavior signature for a malware M.
 This formula represents that SM is the set of data behavior that consistently appears in n malware runs,
but never appears in m kind runs. The underlying observation from this formula is that kernel malware
will consistently perform malicious operations during attacks.
4.2.2 Malware Detection
This module detects the malware activities performed at runtime in a kernel execution in support with
the malware signature pattern generated. It characterized the malicious data behavior by measuring the behavior
instruction difference in relates to the generated signature pattern for an activity. In order to reliably characterize
the data behavior of kernel malware in dynamic execution, we test multiple kernel runs over the signature
generated for matching a malware signature.
 The likelihood that a malware program M is present in a tested run r is determined by deriving a set of
data behavior elements in SM which belong to the data behavior profile, Dr.
 This set I corresponds to the intersection of SM and Dr i.e.,
Novel Malware Clustering System Based on Kernel Data Structure
DOI: 10.9790/0661-17660107 www.iosrjournals.org 4 | Page
 SM is a data behavior signature of a data behavior profile that is a set of data behavior elements derived by
the intersection and union of data behavior profiles. If I has a variation from a define threshold limit then it
can considered as malware detection. The detected malware are clustered using k-mean algorithm for
further analysis.
4.3 Mathematical Model for Classification and Clustering
4.3.1 Classification Using Rule-Based Classification
Rules are a good way of representing information or bits of knowledge. A rule-based classifier uses a
set of IF-THEN rules for classification. IF-THEN rules can be extracted directly from the training data using a
sequential covering algorithm. The name comes from the notion that the rules are learned sequentially (one at a
time), where each rule for a given class will ideally cover many of the tuples of that class.
Sequential covering algorithms are the most widely used approach to mining disjunctive sets of
classification rules, and form the topic of this subsection. Note that in a newer alternative approach,
classification rules can be generated using associative classification algorithms, which search for attribute-value
pairs that occur frequently in the data. These pairs may form association rules, which can be analyzed and used
in classification.
Algorithm: Sequential covering. Learn a set of IF-THEN rules for classification.
Input:
1. D, a data set class-labeled tuples;
2. Att-vals, the set of all attributes and their possible values.
Output: A set of IF_THEN rules.
Method:
1. Rule_Set = {}; //Initial set of rules learned is empty
2. For each class c do
3. Repeat
4. Rule = Learn_One_Rule(D, Att_vals, c);
5. Remove tuples covered by Rule from D;
6. Until terminating condition;
7. Rule_Set = Rule_Set + Rule; // add new rule to rule set
8. End for
9. Return Rule_Set
A basic sequential covering algorithm is shown in Algorithm. Here, rules are learned for one class at a
time. Ideally, when learning a rule for a class, Ci, we would like the rule to cover all (or many) of the training
tuples of class C and none (or few) of the tuples from other classes. In this way, the rules learned should be of
high accuracy. The rules need not necessarily be of high coverage. This is because we can have more than one
rule for a class, so that different rules may cover different tuples within the same class. The process continues
until the terminating condition is met, such as when there are no more training tuples or the quality of a rule
returned is below a user-specified threshold. The Learn One Rule procedure finds the “best” rule for the current
class, given the current set of training tuples.
4.3.2 Clustering Using K-Mean Approach
The k-means algorithm takes the input parameter, k, and partitions a set of n objects into k clusters so
that the resulting intracluster similarity is high but the intercluster similarity is low. Cluster similarity is
measured in regard to the mean value of the objects in a cluster, which can be viewed as the cluster’s centroid or
center of gravity.
We define k main clusters and under each cluster we have sub-cluster as shown in Table 4.1,
Novel Malware Clustering System Based on Kernel Data Structure
DOI: 10.9790/0661-17660107 www.iosrjournals.org 5 | Page
Table- 4.1: k main clusters and sub clusters.
k Main Cluster Sub-Clusters
1_DATA_ATTACKS
Ipsweep Mscan
Nmap portsweep
Saint Satan
spy
2_APPLICATION_ATTACKS
guess_passwd ftp_write
Imap multihop
Named Phf
Sendmail snmp
Getattack snmpguess
Warezmaster warezclient
Worm Xlock
xsnoop
3_SYSTEM_ATTACKS
buffer_overflow
httptunnel Loadmodule
perl rootkit
ps sqlattack
xterm
4_DOS_ATTACKS
Apache2 Back
Land mailbomb
Neptune pod
Processtable SYNFlood
Smurf Teardrop
Udpstrom
We run, K parameters of data → KERNEL_TRAIN_DATA which already classified with class label,
to create n Objects for each sub-clusters with it features data for the further classification → Files in
Trained_Classification_Output Folder.
V. Evaluation
To measure the performance of the proposal we compute the Classification Accuracy by measuring
True Positive, False Negative, False Positive, True Negative values. Ideally, malware detection systems (MDS)
should have an attack detection rate (DR) of 100% along with false positive (FP) of 0%. Nevertheless, in
practice this is really hard to achieve. The most important parameters involved in the performance estimation of
malware detection systems are shown in Table-5.1.
Table-5.1: Parameters for performance estimation of MDS.
Parameters Definition
True Positive (TP) or Detection Rate
(DR)
Attack occur and alarm raised
False Positive (FP) No attack but alarm raised
True Negative (TN) No attack and no alarm
False Negative (FN) Attack occur but no alarm
Malware behavior analysis has discovered 20 suspicious malware behaviors. We observed the executed
malware by focusing it to the specific target and operation behavior in windows environment systems. We also
classify the malware specific operation into 4 main classes which are Data, Application, System and DoS.
Malware that are attacked File is group under Data class while malware that attacked Browser is group under
Application class. Malware that are attacked Kernel, Operating System and Registry is group under System
class. Lastly, malware that are attacked CPU, Memory and Network is group under DoS class as shown in
Table-5.2.
Table-5.2: Machine learning classifier in malware classification
Class
Target Operation (CTO)
Rank Attack Example Affected Example
Data 1
Malware attack office and adobe
file
.doc, .ppt, .xls, .pdf etc
Application 2
Malware attack application audio
and video application
Microsoft Office, Winamp and
Windows Media Player
System 3
Malware attack the entire Operating
System
Windows XP, Windows 7 and
Windows Server 2008
DoS 4
Malware attack the physical
hardware and entire machine
CPU usage, memory and network
access
Novel Malware Clustering System Based on Kernel Data Structure
DOI: 10.9790/0661-17660107 www.iosrjournals.org 6 | Page
These four malware classes are related with each other in rank 1 to 4 starting with Data class and end
with DoS class. These classes are actually inspired from basic fundamental of computer physical architecture.
According to Ivy, physical architecture of host-based computer consists of application, operating system and
hardware.
For this work we used 37042 trained samples data and 25 malware samples files for the evaluation. The
control value in this experiment is called as ―”Threshold” Threshold is the total or the value of training data
that has been trained. This work trained the training sample first and the control value is set from 50 % to 90%
trained samples. There are 25 sample malware data files for testing purposes and the same samples is used for
each Threshold values. In order to review the classifier, accuracy are calculated by using formula as follows,
The experiment is conducted by using our new MDS Classifier. 5 sample malware files have been
tested by adjusting Threshold value from 0.5 to 0.9. Table 5.3 and Fig. 5.1 show the relationship between
Threshold value and the accuracy.
Table 5.3: Classifier Results Measures with different threshold
Threshold TP TN FP FN Accuracy
50 1080 618 288 685 63.57169599
60 982 519 108 502 71.1037423
70 886 399 86 387 73.09442548
80 590 280 55 209 76.71957672
90 485 382 14 110 87.48738648
Fig. 5.1: Classification Accuracy
We observed the values of Parameters for performance estimation of MDS by using different
Threshold values from 0.5 to 0.9. The Fig. 5.2 shows the graphical representation of different threshold values
and these parameters.
Novel Malware Clustering System Based on Kernel Data Structure
DOI: 10.9790/0661-17660107 www.iosrjournals.org 7 | Page
Fig. 5.2: Classification Result Comparison
VI. Conclusion
Many malware detection mechanisms rely on the properties of malware code such as the injection of
unauthorized code and the patterns of malicious code sequences. While these approaches are effective for
classic malware, emerging malicious programs are introducing advanced techniques such as return/jump
oriented programming, code obfuscation, and code emulation to elude those malware detection mechanisms. In
this work, we have presented a new approach for classifying kernel malware based on the properties of kernel
data objects. This system is composed of two modules asMalware Signature Generation and Malware Detection
which helps to design a classifier which enables to detect accurate malware on the kernel memory access
patterns. Experiment result shows higher accuracy with increasing classification threshold.
References
[1] Junghwan R, R Riley, Z Lin, X Jiang, and D Xu, "Data-Centric OS Kernel Malware Characterization" IEEE Transactions on
Information Forensics And Security, Vol. 9, No. 1, January 2014.
[2] Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. G-Free: Defeating Return-oriented Programming
through Gadget-less Binaries. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC’10), 2010.
[3] H. Etoh, "GCC Extension for Protecting Applications From Stack-smashing Attacks".
http://www.trl.ibm.com/projects/security/ssp/. Accessed May 2011.
[4] Jinku Li, Zhi Wang, Xuxian Jiang, Michael Grace, and Sina Bahram. Defeating Return-oriented Rootkits with”Return-Less”
Kernels. In Proceedings of the 5th European Conference on Computer Systems (EUROSYS’10), 2010.
[5] Phrack Magazine. Linux On-the-fly Kernel Patching without LKM. http:// www.phrack.com/issues.html?issue=58&id=7. Accessed
May 2011.
[6] M. W. Lucas Davi and Ahmad-Reza Sadeghi. Ropdefender: A Detection Tool to Defend against Return-oriented Programming
Attacks. 2010. Technical Report HGI-TR-2010-001.
[7] Ryan Riley, Xuxian Jiang, and Dongyan Xu. Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory
Shadowing. In Proceedings of 11th International Symposium on Recent Advances in Intrusion Detection (RAID’08), 2008.
[8] Davide Balzarotti, Marco Cova, Christoph Karlberger, Christopher Kruegel, EnginKirda, and Giovanni Vigna. Efficient Detection
of Split Personalities in Malware. In Proceedings of the 17th Annual Network and Distributed System Security Symposium
(NDSS’10), 2010.
[9] Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiaoyong Zhou, and Xiao Feng Wang. Effective
and Efficient Malware Detection at the End Host. In Proceedings of the 18th Usenix Security Symposium (Security’09),2009
[10] R. Riley, X. Jiang, and D. Xu, “An architectural approach to preventing code injection attacks,” IEEE Trans. Dependable Secure
Comput.,vol.7, no. 4, pp. 351–365, Dec. 2009.
[11] A. Seshadri, M. Luk, N. Qu, and A. Perrig, “SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity
OSes,” in Proc. 21st SOSP, Oct. 2007, pp. 1–17.
[12] C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, et al., “StackGuard: Automatic adaptive detection and prevention of
buffer-overfow attacks,” in Proc. 7th USENIX Sec. Conf., Jan. 1998, pp. 63–78.
[13] Nergal, “The advanced return-into-lib(c) exploits: PaX case study,” Phrack, vol. 11, no. 58, article 4, Dec. 2001.
[14] Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity
for Commodity OSes. In Proceedings of 21st Symposium on Operating Systems Principles (SOSP’07).ACM, 2007.
[15] Erik Buchanan, Ryan Roemer, HovavShacham, and Stefan Savage. When Good Instructions Go Bad: Generalizing Return-Oriented
Programming to RISC. In Proceedings of CCS 2008, pages 27–38. ACM Press, October 2008.
[16] Hovav Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), pages 552–561. ACM, 2007.
[17] Monirul Sharif, Andrea Lanzi, Jonathon Giffn, and Wenke Lee. Impeding Malware Analysis Using Conditional Code Obfuscation.
In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS’08), 2008.
[18] Monirul Sharif, Andrea Lanzi, Jonathon Giffn, and Wenke Lee. Automatic Reverse Engineering of Malware Emulators. In
Proceedings of the 2009 30th IEEE Symposium on Security and Privacy,2009

Contenu connexe

Tendances

Ids 013 detection approaches
Ids 013 detection approachesIds 013 detection approaches
Ids 013 detection approachesjyoti_lakhani
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...IJCSIS Research Publications
 
Metamorphic Malware Analysis and Detection
Metamorphic Malware Analysis and DetectionMetamorphic Malware Analysis and Detection
Metamorphic Malware Analysis and DetectionGrijesh Chauhan
 
A sense of self for unix processes
A sense of self for unix processesA sense of self for unix processes
A sense of self for unix processesUltraUploader
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET Journal
 
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...IJNSA Journal
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperAlexander Decker
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...ijaia
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...gerogepatton
 
Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining conceptsJaideep Ghosh
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesRaja Ram
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 

Tendances (17)

Ids 013 detection approaches
Ids 013 detection approachesIds 013 detection approaches
Ids 013 detection approaches
 
Bp24447451
Bp24447451Bp24447451
Bp24447451
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
Metamorphic Malware Analysis and Detection
Metamorphic Malware Analysis and DetectionMetamorphic Malware Analysis and Detection
Metamorphic Malware Analysis and Detection
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
A sense of self for unix processes
A sense of self for unix processesA sense of self for unix processes
A sense of self for unix processes
 
[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...
[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...
[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
 
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paper
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining concepts
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
Idps
IdpsIdps
Idps
 

Similaire à Novel Malware Clustering System Based on Kernel Data Structure

Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approachijsrd.com
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningjaigera
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...IJNSA Journal
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...cyberprosocial
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware IOSR Journals
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....Research Publish Journals (Publisher)
 
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...CSCJournals
 
Agisa towards automatic generation of infection signatures
Agisa towards automatic generation of infection signaturesAgisa towards automatic generation of infection signatures
Agisa towards automatic generation of infection signaturesUltraUploader
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxAlamgir Hossain
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Akash Karwande
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Editor IJARCET
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Editor IJARCET
 
Features for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing EnvironmentsFeatures for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing EnvironmentsIJEACS
 
What Are The Types of Malware? Must Read
What Are The Types of Malware? Must ReadWhat Are The Types of Malware? Must Read
What Are The Types of Malware? Must ReadBytecode Security
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Papitha Velumani
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesKelly Taylor
 

Similaire à Novel Malware Clustering System Based on Kernel Data Structure (20)

Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approach
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
A0430104
A0430104A0430104
A0430104
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
 
Agisa towards automatic generation of infection signatures
Agisa towards automatic generation of infection signaturesAgisa towards automatic generation of infection signatures
Agisa towards automatic generation of infection signatures
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 
Features for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing EnvironmentsFeatures for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing Environments
 
What Are The Types of Malware? Must Read
What Are The Types of Malware? Must ReadWhat Are The Types of Malware? Must Read
What Are The Types of Malware? Must Read
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 

Plus de iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

Plus de iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Dernier

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 

Dernier (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 

Novel Malware Clustering System Based on Kernel Data Structure

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. VI (Nov – Dec. 2015), PP 01-07 www.iosrjournals.org DOI: 10.9790/0661-17660107 www.iosrjournals.org 1 | Page Novel Malware Clustering System Based on Kernel Data Structure Bhandare Trupti Vasantrao1 , Pramod B. Mali2 1 PG Student, Department of Computer Engineering, Smt. Kashibai Navale College of Engineering, Vadgaon Bk, Pune, India 2 Assistant Professor, Department of Computer Engineering, Smt. Kashibai Navale College of Engineering, Vadgaon Bk, Pune, India Abstract : An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system’s operations. Traditional malware detection approaches have based on the code- centric aspects of malicious programs, e.g. injection of unauthorized code or the control flow patterns of malware programs. In response to these malware detection strategies, modern malware focus on advanced techniques such as reusing existing code or complicated malware code to circumvent detection. A new perspective is introduced to detect malware which is different from code-centric approaches. The data centric malware defense architecture (DMDA) is introduced which models and detects malware behavior. This architecture is based on properties of the kernel data objects that are targeted during malware attacks. This architecture requires external monitoring. External monitor resides outside the monitored kernel and ensures temper-resistance. This architecture consists of three core system components that enable inspection of the kernel data properties and depending upon these properties from malware cluster. The system clusters malware depending upon the kernel data objects. Keywords: Kernel data structure, malware signature, malware clustering, kernel malware classification. I. Introduction An operating system kernel is the core of system software which is responsible for the integrity and operations of a conventional computer system. Developers of malicious software (malware) have been continuously exploring various attack vectors to tamper with the kernel. Traditional malware detection approaches have focused on the code centric aspects of malicious programs, such as the injection of unauthorized code or the control flow patterns of malware programs. However, in response to these malware detection strategies, modern malware is employing advanced techniques such as reusing existing code or complicated malware code to circumvent detection. Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. Modern malware use a variety of techniques to cause divergence in the attacked program’s behaviour and achieve the attacker’s goal. Traditional malicious programs such as computer viruses, worms, and exploits have been using code injection attacks which inject malicious code into a program to perform a nefarious function. Intrusion detection approaches based on such code properties effectively detect or prevent this class of malware attacks [10], [11], [12]. Data-centric approaches require neither the detection of code injection nor malicious code patterns. Therefore they are not directly subvertible using code reuse or obfuscation techniques. However, detecting malware based on data modifications has a unique challenge that makes it distinct from code based approaches. Unlike code, which is typically expected to be invariant, data status can be dynamic. Correspondingly, conventional integrity checking cannot be applied to data properties. In addition, monitoring data objects of an operating system (OS) kernel has additional challenges because an OS may be the lowest software layer in conventional computing environments, meaning that there is no monitoring layer below it. Traditional malware detection and analysis approaches have been focusing on code-centric aspects of malicious programs, such as detection of the injection of malicious code or matching malicious code sequences. However, modern malware has been employing advanced strategies, such as reusing legitimate code or complicated malware code to circumvent the detection. As a new perspective to complement code-centric approaches, we propose a data-centric OS kernel malware characterization architecture that detects and characterizes malware attacks based on the properties of data objects manipulated during the attacks [1].
  • 2. Novel Malware Clustering System Based on Kernel Data Structure DOI: 10.9790/0661-17660107 www.iosrjournals.org 2 | Page To address the challenges of relying on only code in malware defence, we propose new approaches based on the properties of data objects that are targeted in malware attacks. These approaches do not require the detection of the injected code or the specific sequence of malicious code. Therefore, they are not directly subject to attacks targeting the approaches based on code properties. II. Literature Survey Data invariants are one important class of integrity properties that concerns the expected values of program variables (other integrity properties include control flow integrity and information flow integrity). Since the behaviour of a program can largely depend on its variables, manipulation of data has been an important malware attack technique. Malicious code or malware has long been recognized as the major threat to the computing world [7]. According to Mohamad Fadli and Aman Jantan, all malware have their specific objective and target, but the main purpose is to create threats to the data network and computer operation [8]. In general, incoming files are considered as malware if they perform suspicious attack and might harm computer systems. These files can break into vulnerable systems from many ways such as via internet (HTTP), email, removable media, Peer-2- Peer (P2P) and Instant Messaging (IM). Anti-malware products in host machine will perform scanning process to detect and identify the attack. If unknown kinds of attack are found, the samples will be sent to anti-malware vendors to be analyzed. Once analysis process is completed, vendors will update the virus signature database server and the latest update can be downloaded from host machine side. Classification part will classify the attack sample into the correct malware classes and prediction as well as removal part will remove, clean or quarantine the attacks. Many malware detection mechanisms rely on the properties of malware code such as the injection of unauthorized code [7][14] and the patterns of malicious code sequences [8][9]. While these approaches are effective for classic malware, emerging malicious programs are introducing advanced techniques such as return/jump oriented programming [4][15][16], code obfuscation [17], and code emulation [18] to elude those malware detection mechanisms. In this paper, we have presented a new approach for detecting kernel malware based on the properties of kernel data objects. Compared to dynamic kernel objects, static objects have memory addresses that are predetermined at the compilation time. The manipulation of static objects is observed as write accesses to their unique addresses. If such memory access patterns are observed specifically during malware execution, they are extracted as malware signatures. For example, system call hijacking is implemented as the manipulation of the system call table that is a static object. The manipulation of this object by other than the legitimate initialization code is rare in benign execution. Thus, this attack pattern is automatically extracted as a signature. III. Proposed System We present a novel scheme that addresses these challenges and enables OS kernel malware detection approaches based on kernel data properties. The monitoring system should be designed in a way that cannot directly be altered by potentially malicious code therefore; we use an external monitor to observe the target OS kernel. An external monitor has a challenging task in identifying the data object information of the monitored kernel, which is known as a semantic gap. Such information should be reconstructed externally in the monitor. We propose a classification approach for identification of the malware characterization over kernel data structure and clustering using data object properties to detect kernel malware, which consists of two main components. The first component is a kernel object mapping system that externally identifies the dynamic kernel objects of the monitored OS kernel at runtime, and our aim is to observe memory accesses to kernel data objects. This component is essential because it enables an external monitor to recognize the data objects that are targeted by the accesses. As well as being an infrastructure to recognize data objects, this system provides effective applications such as the detection of data hiding kernel malware attacks and the analysis of malware behavior targeting dynamic kernel objects. In addition to the kernel data mapping system, we propose a new approach that detects malware by matching memory access patterns that specifically occur during malware attacks. Dynamic kernel analysis can produce effective malware signatures that can suppress frequent false positives in typical workloads by extracting malware memory reference patterns specific to malware attacks. IV. System Implementation This section describes the system designs in the form system architecture, modules. It is also explain the software and hardware requirement to perform the system execution.
  • 3. Novel Malware Clustering System Based on Kernel Data Structure DOI: 10.9790/0661-17660107 www.iosrjournals.org 3 | Page 4.1 System Architecture We first present how we can generate the data information and present our approach to characterize malware based on kernel data patterns. In this paper we propose identification of the malware characterization over kernel data structure, which models and detects malware behavior using the properties of kernel data objects. Fig. 4.1: Architecture Design Identification of the Malware Characterization 4.2 System Modules Based on the design architecture in Fig. 4.1 it has two modules: 1. Malware Signature Generation 2. Malware Detection 4.2.1 Malware Signature Generation This module works on the collected kernel information data from the kernel behavior on different type of system activities. The collected information is cleaned using a data cleaning mechanism to remove the noise information and run a rule-based classification approach to generate an activities based signature patterns known as data behavior pattern (DBP). A signature generally is a pattern of instruction sequence or system calls sequence performed for executing or completing a job. The generated activity signature patterns are stored for runtime testing. To generate a malware signature for a malicious kernel run j with malware M, we apply set operations on n malicious kernel runs and m kind runs as follows.  Let’s assume DM, j, and DB,k → represents a data behavior profile for a kind of kernel execution k, and SM is called a data behavior signature for a malware M.  This formula represents that SM is the set of data behavior that consistently appears in n malware runs, but never appears in m kind runs. The underlying observation from this formula is that kernel malware will consistently perform malicious operations during attacks. 4.2.2 Malware Detection This module detects the malware activities performed at runtime in a kernel execution in support with the malware signature pattern generated. It characterized the malicious data behavior by measuring the behavior instruction difference in relates to the generated signature pattern for an activity. In order to reliably characterize the data behavior of kernel malware in dynamic execution, we test multiple kernel runs over the signature generated for matching a malware signature.  The likelihood that a malware program M is present in a tested run r is determined by deriving a set of data behavior elements in SM which belong to the data behavior profile, Dr.  This set I corresponds to the intersection of SM and Dr i.e.,
  • 4. Novel Malware Clustering System Based on Kernel Data Structure DOI: 10.9790/0661-17660107 www.iosrjournals.org 4 | Page  SM is a data behavior signature of a data behavior profile that is a set of data behavior elements derived by the intersection and union of data behavior profiles. If I has a variation from a define threshold limit then it can considered as malware detection. The detected malware are clustered using k-mean algorithm for further analysis. 4.3 Mathematical Model for Classification and Clustering 4.3.1 Classification Using Rule-Based Classification Rules are a good way of representing information or bits of knowledge. A rule-based classifier uses a set of IF-THEN rules for classification. IF-THEN rules can be extracted directly from the training data using a sequential covering algorithm. The name comes from the notion that the rules are learned sequentially (one at a time), where each rule for a given class will ideally cover many of the tuples of that class. Sequential covering algorithms are the most widely used approach to mining disjunctive sets of classification rules, and form the topic of this subsection. Note that in a newer alternative approach, classification rules can be generated using associative classification algorithms, which search for attribute-value pairs that occur frequently in the data. These pairs may form association rules, which can be analyzed and used in classification. Algorithm: Sequential covering. Learn a set of IF-THEN rules for classification. Input: 1. D, a data set class-labeled tuples; 2. Att-vals, the set of all attributes and their possible values. Output: A set of IF_THEN rules. Method: 1. Rule_Set = {}; //Initial set of rules learned is empty 2. For each class c do 3. Repeat 4. Rule = Learn_One_Rule(D, Att_vals, c); 5. Remove tuples covered by Rule from D; 6. Until terminating condition; 7. Rule_Set = Rule_Set + Rule; // add new rule to rule set 8. End for 9. Return Rule_Set A basic sequential covering algorithm is shown in Algorithm. Here, rules are learned for one class at a time. Ideally, when learning a rule for a class, Ci, we would like the rule to cover all (or many) of the training tuples of class C and none (or few) of the tuples from other classes. In this way, the rules learned should be of high accuracy. The rules need not necessarily be of high coverage. This is because we can have more than one rule for a class, so that different rules may cover different tuples within the same class. The process continues until the terminating condition is met, such as when there are no more training tuples or the quality of a rule returned is below a user-specified threshold. The Learn One Rule procedure finds the “best” rule for the current class, given the current set of training tuples. 4.3.2 Clustering Using K-Mean Approach The k-means algorithm takes the input parameter, k, and partitions a set of n objects into k clusters so that the resulting intracluster similarity is high but the intercluster similarity is low. Cluster similarity is measured in regard to the mean value of the objects in a cluster, which can be viewed as the cluster’s centroid or center of gravity. We define k main clusters and under each cluster we have sub-cluster as shown in Table 4.1,
  • 5. Novel Malware Clustering System Based on Kernel Data Structure DOI: 10.9790/0661-17660107 www.iosrjournals.org 5 | Page Table- 4.1: k main clusters and sub clusters. k Main Cluster Sub-Clusters 1_DATA_ATTACKS Ipsweep Mscan Nmap portsweep Saint Satan spy 2_APPLICATION_ATTACKS guess_passwd ftp_write Imap multihop Named Phf Sendmail snmp Getattack snmpguess Warezmaster warezclient Worm Xlock xsnoop 3_SYSTEM_ATTACKS buffer_overflow httptunnel Loadmodule perl rootkit ps sqlattack xterm 4_DOS_ATTACKS Apache2 Back Land mailbomb Neptune pod Processtable SYNFlood Smurf Teardrop Udpstrom We run, K parameters of data → KERNEL_TRAIN_DATA which already classified with class label, to create n Objects for each sub-clusters with it features data for the further classification → Files in Trained_Classification_Output Folder. V. Evaluation To measure the performance of the proposal we compute the Classification Accuracy by measuring True Positive, False Negative, False Positive, True Negative values. Ideally, malware detection systems (MDS) should have an attack detection rate (DR) of 100% along with false positive (FP) of 0%. Nevertheless, in practice this is really hard to achieve. The most important parameters involved in the performance estimation of malware detection systems are shown in Table-5.1. Table-5.1: Parameters for performance estimation of MDS. Parameters Definition True Positive (TP) or Detection Rate (DR) Attack occur and alarm raised False Positive (FP) No attack but alarm raised True Negative (TN) No attack and no alarm False Negative (FN) Attack occur but no alarm Malware behavior analysis has discovered 20 suspicious malware behaviors. We observed the executed malware by focusing it to the specific target and operation behavior in windows environment systems. We also classify the malware specific operation into 4 main classes which are Data, Application, System and DoS. Malware that are attacked File is group under Data class while malware that attacked Browser is group under Application class. Malware that are attacked Kernel, Operating System and Registry is group under System class. Lastly, malware that are attacked CPU, Memory and Network is group under DoS class as shown in Table-5.2. Table-5.2: Machine learning classifier in malware classification Class Target Operation (CTO) Rank Attack Example Affected Example Data 1 Malware attack office and adobe file .doc, .ppt, .xls, .pdf etc Application 2 Malware attack application audio and video application Microsoft Office, Winamp and Windows Media Player System 3 Malware attack the entire Operating System Windows XP, Windows 7 and Windows Server 2008 DoS 4 Malware attack the physical hardware and entire machine CPU usage, memory and network access
  • 6. Novel Malware Clustering System Based on Kernel Data Structure DOI: 10.9790/0661-17660107 www.iosrjournals.org 6 | Page These four malware classes are related with each other in rank 1 to 4 starting with Data class and end with DoS class. These classes are actually inspired from basic fundamental of computer physical architecture. According to Ivy, physical architecture of host-based computer consists of application, operating system and hardware. For this work we used 37042 trained samples data and 25 malware samples files for the evaluation. The control value in this experiment is called as ―”Threshold” Threshold is the total or the value of training data that has been trained. This work trained the training sample first and the control value is set from 50 % to 90% trained samples. There are 25 sample malware data files for testing purposes and the same samples is used for each Threshold values. In order to review the classifier, accuracy are calculated by using formula as follows, The experiment is conducted by using our new MDS Classifier. 5 sample malware files have been tested by adjusting Threshold value from 0.5 to 0.9. Table 5.3 and Fig. 5.1 show the relationship between Threshold value and the accuracy. Table 5.3: Classifier Results Measures with different threshold Threshold TP TN FP FN Accuracy 50 1080 618 288 685 63.57169599 60 982 519 108 502 71.1037423 70 886 399 86 387 73.09442548 80 590 280 55 209 76.71957672 90 485 382 14 110 87.48738648 Fig. 5.1: Classification Accuracy We observed the values of Parameters for performance estimation of MDS by using different Threshold values from 0.5 to 0.9. The Fig. 5.2 shows the graphical representation of different threshold values and these parameters.
  • 7. Novel Malware Clustering System Based on Kernel Data Structure DOI: 10.9790/0661-17660107 www.iosrjournals.org 7 | Page Fig. 5.2: Classification Result Comparison VI. Conclusion Many malware detection mechanisms rely on the properties of malware code such as the injection of unauthorized code and the patterns of malicious code sequences. While these approaches are effective for classic malware, emerging malicious programs are introducing advanced techniques such as return/jump oriented programming, code obfuscation, and code emulation to elude those malware detection mechanisms. In this work, we have presented a new approach for classifying kernel malware based on the properties of kernel data objects. This system is composed of two modules asMalware Signature Generation and Malware Detection which helps to design a classifier which enables to detect accurate malware on the kernel memory access patterns. Experiment result shows higher accuracy with increasing classification threshold. References [1] Junghwan R, R Riley, Z Lin, X Jiang, and D Xu, "Data-Centric OS Kernel Malware Characterization" IEEE Transactions on Information Forensics And Security, Vol. 9, No. 1, January 2014. [2] Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. G-Free: Defeating Return-oriented Programming through Gadget-less Binaries. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC’10), 2010. [3] H. Etoh, "GCC Extension for Protecting Applications From Stack-smashing Attacks". http://www.trl.ibm.com/projects/security/ssp/. Accessed May 2011. [4] Jinku Li, Zhi Wang, Xuxian Jiang, Michael Grace, and Sina Bahram. Defeating Return-oriented Rootkits with”Return-Less” Kernels. In Proceedings of the 5th European Conference on Computer Systems (EUROSYS’10), 2010. [5] Phrack Magazine. Linux On-the-fly Kernel Patching without LKM. http:// www.phrack.com/issues.html?issue=58&id=7. Accessed May 2011. [6] M. W. Lucas Davi and Ahmad-Reza Sadeghi. Ropdefender: A Detection Tool to Defend against Return-oriented Programming Attacks. 2010. Technical Report HGI-TR-2010-001. [7] Ryan Riley, Xuxian Jiang, and Dongyan Xu. Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. In Proceedings of 11th International Symposium on Recent Advances in Intrusion Detection (RAID’08), 2008. [8] Davide Balzarotti, Marco Cova, Christoph Karlberger, Christopher Kruegel, EnginKirda, and Giovanni Vigna. Efficient Detection of Split Personalities in Malware. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS’10), 2010. [9] Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiaoyong Zhou, and Xiao Feng Wang. Effective and Efficient Malware Detection at the End Host. In Proceedings of the 18th Usenix Security Symposium (Security’09),2009 [10] R. Riley, X. Jiang, and D. Xu, “An architectural approach to preventing code injection attacks,” IEEE Trans. Dependable Secure Comput.,vol.7, no. 4, pp. 351–365, Dec. 2009. [11] A. Seshadri, M. Luk, N. Qu, and A. Perrig, “SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes,” in Proc. 21st SOSP, Oct. 2007, pp. 1–17. [12] C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, et al., “StackGuard: Automatic adaptive detection and prevention of buffer-overfow attacks,” in Proc. 7th USENIX Sec. Conf., Jan. 1998, pp. 63–78. [13] Nergal, “The advanced return-into-lib(c) exploits: PaX case study,” Phrack, vol. 11, no. 58, article 4, Dec. 2001. [14] Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In Proceedings of 21st Symposium on Operating Systems Principles (SOSP’07).ACM, 2007. [15] Erik Buchanan, Ryan Roemer, HovavShacham, and Stefan Savage. When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC. In Proceedings of CCS 2008, pages 27–38. ACM Press, October 2008. [16] Hovav Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), pages 552–561. ACM, 2007. [17] Monirul Sharif, Andrea Lanzi, Jonathon Giffn, and Wenke Lee. Impeding Malware Analysis Using Conditional Code Obfuscation. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS’08), 2008. [18] Monirul Sharif, Andrea Lanzi, Jonathon Giffn, and Wenke Lee. Automatic Reverse Engineering of Malware Emulators. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy,2009