Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques

被引:0
|
作者
De Gaspari, Fabio [1 ]
Hitaj, Dorjan [1 ]
Pagnotta, Giulio [1 ]
De Carli, Lorenzo [2 ]
Mancini, Luigi, V [1 ]
机构
[1] Sapienza Univ Roma, Dipartimento Informat, Rome, Italy
[2] Worcester Polytech Inst, Dept Comp Sci, Worcester, MA 01609 USA
来源
NEURAL COMPUTING & APPLICATIONS | 2022年 / 34卷 / 14期
基金
欧盟地平线“2020”;
关键词
Ransomware; Machine learning; Behavioral detection; Evasion;
D O I
10.1007/s00521-022-07096-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent progress in machine learning has led to promising results in behavioral malware detection. Behavioral modeling identifies malicious processes via features derived by their runtime behavior. Behavioral features hold great promise as they are intrinsically related to the functioning of each malware, and are therefore considered difficult to evade. Indeed, while a significant amount of results exists on evasion of static malware features, evasion of dynamic features has seen limited work. This paper examines the robustness of behavioral ransomware detectors to evasion and proposes multiple novel techniques to evade them. Ransomware behavior differs significantly from that of benign processes, making it an ideal best case for behavioral detectors, and a difficult candidate for evasion. We identify and propose a set of novel attacks that distribute the overall malware workload across a small set of independent, cooperating processes in order to avoid the generation of significant behavioral features. Our most effective attack decreases the accuracy of a state-of-the-art classifier from 98.6 to 0% using only 18 cooperating processes. Furthermore, we show our attacks to be effective against commercial ransomware detectors in a black-box setting. Finally, we evaluate a detector designed to identify our most effective attack, as well as discuss potential directions to mitigate our most advanced attack.
引用
收藏
页码:12077 / 12096
页数:20
相关论文
共 50 条
  • [1] Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques
    De Gaspari, Fabio
    Hitaj, Dorjan
    Pagnotta, Giulio
    De Carli, Lorenzo
    Mancini, Luigi V.
    [J]. Neural Computing and Applications, 2022, 34 (14) : 12077 - 12096
  • [2] Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques
    Fabio De Gaspari
    Dorjan Hitaj
    Giulio Pagnotta
    Lorenzo De Carli
    Luigi V. Mancini
    [J]. Neural Computing and Applications, 2022, 34 : 12077 - 12096
  • [3] Evading Classifiers by Morphing in the Dark
    Dang, Hung
    Huang, Yue
    Chang, Ee-Chien
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 119 - 133
  • [4] Evading Botnet Detection
    Geiginger, Lisa-Marie
    Zseby, Tanja
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1331 - 1340
  • [5] Automatically Evading Classifiers A Case Study on PDF Malware Classifiers
    Xu, Weilin
    Qi, Yanjun
    Evans, David
    [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [6] Evading API Call Sequence Based Malware Classifiers
    Fadadu, Fenil
    Handa, Anand
    Kumar, Nitesh
    Shukla, Sandeep Kumar
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 18 - 33
  • [7] CharBot: A Simple and Effective Method for Evading DGA Classifiers
    Peck, Jonathan
    Nie, Claire
    Sivaguru, Raaghavi
    Grumer, Charles
    Olumofin, Femi
    Yu, Bin
    Nascimento, Anderson
    De Cock, Martine
    [J]. IEEE ACCESS, 2019, 7 : 91759 - 91771
  • [8] Query Strategies for Evading Convex-Inducing Classifiers
    Nelson, Blaine
    Rubinstein, Benjamin I. P.
    Huang, Ling
    Joseph, Anthony D.
    Lee, Steven J.
    Rao, Satish
    Tygar, J. D.
    [J]. JOURNAL OF MACHINE LEARNING RESEARCH, 2012, 13 : 1293 - 1332
  • [9] Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic
    Sun, Hanwu
    Peng, Chengwei
    Sang, Yafei
    Li, Shuhao
    Zhang, Yongzheng
    Zhu, Yujia
    [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2022, PT II, 2022, 461 : 153 - 173
  • [10] Evading PDF Malware Classifiers with Generative Adversarial Network
    Wang, Yaxiao
    Li, Yuanzhang
    Zhang, Quanxin
    Hu, Jingjing
    Kuang, Xiaohui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 374 - 387