Detecting Malicious PowerShell Commands using Deep Neural Networks

被引:32
|
作者
Hendler, Danny [1 ]
Kels, Shay [2 ]
Rubin, Amir [1 ]
机构
[1] Ben Gurion Univ Negev, Beer Sheva, Israel
[2] Microsoft, Herzliyya, Israel
关键词
PowerShell; malware detection; neural networks; natural language processing; deep learning;
D O I
10.1145/3196494.3196511
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Microsoft's PowerShell is a command-line shell and scripting language that is installed by default on Windows machines. Based on Microsoft's.NET framework, it includes an interface that allows programmers to access operating system services. While PowerShell can be configured by administrators for restricting access and reducing vulnerabilities, these restrictions can be bypassed. Moreover, PowerShell commands can be easily generated dynamically, executed from memory, encoded and obfuscated, thus making the logging and forensic analysis of code executed by PowerShell challenging. For all these reasons, PowerShell is increasingly used by cybercriminals as part of their attacks' tool chain, mainly for downloading malicious contents and for lateral movement. Indeed, a recent comprehensive technical report by Symantec dedicated to PowerShell's abuse by cybercrimials [52] reported on a sharp increase in the number of malicious PowerShell samples they received and in the number of penetration tools and frameworks that use PowerShell. This highlights the urgent need of developing effective methods for detecting malicious PowerShell commands. In this work, we address this challenge by implementing several novel detectors of malicious PowerShell commands and evaluating their performance. We implemented both "traditional" natural language processing (NLP) based detectors and detectors based on character-level convolutional neural networks (CNNs). Detectors' performance was evaluated using a large real-world dataset. Our evaluation results show that, although our detectors (and especially the traditional NLP-based ones) individually yield high performance, an ensemble detector that combines an NLP-based classifier with a CNN -based classifier provides the best performance, since the latter classifier is able to detect malicious commands that succeed in evading the former. Our analysis of these evasive commands reveals that some obfuscation patterns automatically detected by the CNN classifier are intrinsically difficult to detect using the NLP techniques we applied. Our detectors provide high recall values while maintaining a very low false positive rate, making us cautiously optimistic that they can be of practical value.
引用
收藏
页码:187 / 197
页数:11
相关论文
共 50 条
  • [1] AST-Based Deep Learning for Detecting Malicious PowerShell
    Rusak, Gili
    Al-Dujaili, Abdullah
    O'Reilly, Una-May
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2276 - 2278
  • [2] Detecting Malicious Websites by using Deep Q-Networks
    Khanh Nguyen
    Park, Younghee
    [J]. 2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [3] Detecting Malicious Blockchain Transactions Using Graph Neural Networks
    Jeyakumar, Samantha Tharani
    Yugarajah, Andrew Charles Eugene
    Hou, Zhe
    Muthukkumarasamy, Vallipuram
    [J]. DISTRIBUTED LEDGER TECHNOLOGY, SDLT 2023, 2024, 1975 : 55 - 71
  • [4] Comparing Deep Neural Networks and Machine Learning for Detecting Malicious Domain Name Registrations
    Colhak, Furkan
    Ecevit, Mert Ilhan
    Dag, Hasan
    Creutzburg, Reiner
    [J]. 2024 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS, COINS 2024, 2024, : 82 - 85
  • [5] PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers
    Tsai, Meng-Han
    Lin, Chia-Ching
    He, Zheng-Gang
    Yang, Wei-Chieh
    Lei, Chin-Laung
    [J]. IEEE ACCESS, 2023, 11 : 256 - 270
  • [6] Effective method for detecting malicious PowerShell scripts based on hybrid features
    Fang, Yong
    Zhou, Xiangyu
    Huang, Cheng
    [J]. NEUROCOMPUTING, 2021, 448 : 30 - 39
  • [7] Providing a Hybrid Approach for Detecting Malicious Traffic on the Computer Networks Using Convolutional Neural Networks
    Pakanzad, Seyed Navid
    Monkaresi, Hamed
    [J]. 2020 28TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2020, : 1189 - 1194
  • [8] Malicious Powershell Detection Using Graph Convolution Network
    Choi, Sunoh
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (14):
  • [9] DNA Privacy: Analyzing Malicious DNA Sequences Using Deep Neural Networks
    Bae, Ho
    Min, Seonwoo
    Choi, Hyun-Soo
    Yoon, Sungroh
    [J]. IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2022, 19 (02) : 888 - 898
  • [10] Deep Neural Networks for Malicious Java']JavaScript Detection Using Bytecode Sequences
    Rozi, Muhammad Fakhrur
    Kim, Sangwook
    Ozawa, Seiichi
    [J]. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,