JUGAAD: Comprehensive Malware Behavior-as-a-Service

被引:1
|
作者
Karapoola, Sareena [1 ]
Singh, Nikhilesh [1 ]
Rebeiro, Chester [1 ]
Kamakoti, V. [1 ]
机构
[1] Indian Inst Technol Madras, Chennai, Tamil Nadu, India
关键词
Dynamic Analysis; Malware; Run-time Behavior; Real-world; Testbeds; VOLATILE MEMORY; ACQUISITION;
D O I
10.1145/3546096.3546108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An in-depth analysis of the impact of malware across multiple layers of cyber-connected systems is crucial for confronting evolving cyber-attacks. Gleaning such insights requires executing malware samples in analysis frameworks and observing their run-time characteristics. However, the evasive nature of malware, its dependence on real-world conditions, Internet connectivity, and short-lived remote servers to reveal its behavior, and the catastrophic consequences of its execution, pose significant challenges in collecting its real-world run-time behavior in analysis environments. In this context, we propose JUGAAD, a malware behavior-as-a-service to meet the demands for the safe execution of malware. Such a service enables the users to submit malware hashes or programs and retrieve their precise and comprehensive real-world run-time characteristics. Unlike prior services that analyze malware and present verdicts on maliciousness and analysis reports, JUGAAD provides raw run-time characteristics to foster unbounded research while alleviating the unpredictable risks involved in executing them. JUGAAD facilitates such a service with a back-end that executes a regular supply of malware samples on a real-world testbed to feed a growing data-corpus that is used to serve the users. With heterogeneous compute and Internet connectivity, the testbed ensures real-world conditions for malware to operate while containing its ramifications. The simultaneous capture of multiple execution artifacts across the system stack, including network, operating system, and hardware, presents a comprehensive view of malware activity to foster multi-dimensional research. Finally, the automated mechanisms in JUGAAD ensure that the data-corpus is continually growing and is up to date with the changing malware landscape.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 50 条
  • [41] IoT Malware Analysis Using Federated Learning: A Comprehensive Survey
    Venkatasubramanian, Madumitha
    Lashkari, Arash Habibi
    Hakak, Saqib
    [J]. IEEE ACCESS, 2023, 11 : 5004 - 5018
  • [42] Comprehensive Android Malware Detection Based on Federated Learning Architecture
    Fang, Wenbo
    He, Junjiang
    Li, Wenshan
    Lan, Xiaolong
    Chen, Yang
    Li, Tao
    Huang, Jiwu
    Zhang, Linlin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3977 - 3990
  • [43] Comprehensive Behaviour of Malware Detection Using the Machine Learning Classifier
    Asha, P.
    Lahari, T.
    Kavya, B.
    [J]. SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 462 - 469
  • [44] Comprehensive review and analysis of anti-malware apps for smartphones
    Talal, Mohammed
    Zaidan, A. A.
    Zaidan, B. B.
    Albahri, O. S.
    Alsalem, M. A.
    Albahri, A. S.
    Alamoodi, A. H.
    Kiah, M. L. M.
    Jumaah, F. M.
    Alaa, Mussab
    [J]. TELECOMMUNICATION SYSTEMS, 2019, 72 (02) : 285 - 337
  • [45] Comprehensive review and analysis of anti-malware apps for smartphones
    Mohammed Talal
    A. A. Zaidan
    B. B. Zaidan
    O. S. Albahri
    M. A. Alsalem
    A. S. Albahri
    A. H. Alamoodi
    M. L. M. Kiah
    F. M. Jumaah
    Mussab Alaa
    [J]. Telecommunication Systems, 2019, 72 : 285 - 337
  • [46] Impeding behavior-based malware analysis via replacement attacks to malware specifications
    Ming J.
    Xin Z.
    Lan P.
    Wu D.
    Liu P.
    Mao B.
    [J]. Journal of Computer Virology and Hacking Techniques, 2017, 13 (3) : 193 - 207
  • [47] A comprehensive review on permissions-based Android malware detection
    Sharma, Yash
    Arora, Anshul
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 1877 - 1912
  • [48] A comprehensive survey on deep learning based malware detection techniques
    Gopinath, M.
    Sethuraman, Sibi Chakkaravarthy
    [J]. COMPUTER SCIENCE REVIEW, 2023, 47
  • [49] A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection
    Kouliaridis, Vasileios
    Kambourakis, Georgios
    [J]. INFORMATION, 2021, 12 (05)
  • [50] Design on Android malware behavior analysis system
    [J]. Li, J.-H. (jovistar@gmail.com), 1600, Beijing University of Posts and Telecommunications (37):