JUGAAD: Comprehensive Malware Behavior-as-a-Service

被引:1
|
作者
Karapoola, Sareena [1 ]
Singh, Nikhilesh [1 ]
Rebeiro, Chester [1 ]
Kamakoti, V. [1 ]
机构
[1] Indian Inst Technol Madras, Chennai, Tamil Nadu, India
关键词
Dynamic Analysis; Malware; Run-time Behavior; Real-world; Testbeds; VOLATILE MEMORY; ACQUISITION;
D O I
10.1145/3546096.3546108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An in-depth analysis of the impact of malware across multiple layers of cyber-connected systems is crucial for confronting evolving cyber-attacks. Gleaning such insights requires executing malware samples in analysis frameworks and observing their run-time characteristics. However, the evasive nature of malware, its dependence on real-world conditions, Internet connectivity, and short-lived remote servers to reveal its behavior, and the catastrophic consequences of its execution, pose significant challenges in collecting its real-world run-time behavior in analysis environments. In this context, we propose JUGAAD, a malware behavior-as-a-service to meet the demands for the safe execution of malware. Such a service enables the users to submit malware hashes or programs and retrieve their precise and comprehensive real-world run-time characteristics. Unlike prior services that analyze malware and present verdicts on maliciousness and analysis reports, JUGAAD provides raw run-time characteristics to foster unbounded research while alleviating the unpredictable risks involved in executing them. JUGAAD facilitates such a service with a back-end that executes a regular supply of malware samples on a real-world testbed to feed a growing data-corpus that is used to serve the users. With heterogeneous compute and Internet connectivity, the testbed ensures real-world conditions for malware to operate while containing its ramifications. The simultaneous capture of multiple execution artifacts across the system stack, including network, operating system, and hardware, presents a comprehensive view of malware activity to foster multi-dimensional research. Finally, the automated mechanisms in JUGAAD ensure that the data-corpus is continually growing and is up to date with the changing malware landscape.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 50 条
  • [1] Comprehensive Behavior Profiling Model for Malware Classification
    Jiang, Jianguo
    Yin, Qilei
    Shi, Zhixin
    Li, Meimei
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 129 - 135
  • [2] Malware Behavior Image for Malware Variant Identification
    Shaid, Syed Zainudeen Mohd
    Maarof, Mohd Aizaini
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 238 - 243
  • [3] The fight against malware as a service
    Davidson, Ron
    [J]. Network Security, 2021, 2021 (08): : 7 - 11
  • [4] Comprehensive Review of Malware Detection Techniques
    Inayat, Usman
    Zia, Muhammad Fahad
    Ali, Fahad
    Ali, Syed Moshin
    Khan, Hafiz Muhammad Ashja
    Noor, Wafa
    [J]. 4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 677 - 682
  • [5] iPanda: A Comprehensive Malware Analysis Tool
    Xie, Peidai
    Lu, Xicheng
    Su, Jinshu
    Wang, Yongjun
    Li, Meijian
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [6] A Comprehensive Review on Malware Detection Approaches
    Aslan, Omer
    Samet, Refik
    [J]. IEEE ACCESS, 2020, 8 : 6249 - 6271
  • [7] Malware models for network and service management
    Francois, Jerome
    State, Radu
    Festor, Olivier
    [J]. INTER-DOMAIN MANAGEMENT, PROCEEDINGS, 2007, 4543 : 192 - +
  • [8] Behavior Abstraction in Malware Analysis
    Beaucamps, Philippe
    Gnaedig, Isabelle
    Marion, Jean-Yves
    [J]. RUNTIME VERIFICATION, 2010, 6418 : 168 - 182
  • [9] Spectral Malware Behavior Clustering
    Giannella, Chris
    Bloedorn, Eric
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 7 - 12
  • [10] Measuring Similarity of Malware Behavior
    Apel, Martin
    Bockermann, Christian
    Meier, Michael
    [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 891 - 898