Efficient Spear-phishing Threat Detection Using Hypervisor Monitor

被引:0
|
作者
Lin, Chih-Hung [1 ,2 ]
Tien, Chin-Wei [1 ]
Chen, Chih-Wei [1 ]
Tien, Chia-Wei [1 ]
Pao, Hsing-Kuo [2 ]
机构
[1] CyberTrust Technol Inst, Inst Informat Ind, Taipei, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
关键词
cyber security; spear-phishing; hardware-assisted virtualization; hypervisor monitor;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, cyber security threats have become increasingly dangerous. Hackers have fabricated fake emails to spoof specific users into clicking on malicious attachments or URL links in them. This kind of threat is called a spear-phishing attack. Because spear-phishing attacks use unknown exploits to trigger malicious activities, it is difficult to effectively defend against them. Thus, this study focuses on the challenges faced, and we develop a Cloud-threat Inspection Appliance (CIA) system to defend against spear-phishing threats. With the advantages of hardware-assisted virtualization technology, we use the CIA to develop a transparent hypervisor monitor that conceals the presence of the detection engine in the hypervisor kernel. In addition, the CIA also designs a document pre-filtering algorithm to enhance system performance. By inspecting PDF format structures, the proposed CIA was able to filter 77% of PDF attachments and prevent them from all being sent into the hypervisor monitor for deeper analysis. Finally, we tested CIA in real-world scenarios. The hypervisor monitor was shown to be a better anti-evasion sandbox than commercial ones. During 2014, CIA inspected 780,000 mails in a company with 200 user accounts, and found 65 unknown samples that were not detected by commercial anti-virus software.
引用
收藏
页码:299 / 303
页数:5
相关论文
共 50 条
  • [1] Enterprise Credential Spear-phishing attack detection
    Al-Hamar, Yuosuf
    Kolivand, Hoshang
    Tajdini, Mostafa
    Saba, Tanzila
    Ramachandran, Varatharajan
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 94
  • [2] Spear-phishing becoming more common
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (08) : 594 - 595
  • [3] Spear-phishing: How to spot and mitigate the menace
    Biometric Technology Today, United Kingdom
    Comput. Fraud Secur., 2013, 1 (11-16):
  • [4] Detecting Spear-phishing Emails Based on Authentication
    Wang Xiujuan
    Zhang Chenxi
    Zheng Kangfeng
    Tang Haoyang
    Tao Yuanrui
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 450 - 456
  • [5] Optimal Personalized Filtering Against Spear-Phishing Attacks
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 958 - 964
  • [6] Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks
    Martin, Jaclyn
    Dube, Chad
    Coovert, Michael D.
    HUMAN FACTORS, 2018, 60 (08) : 1179 - 1191
  • [7] Disguised Executable Files in Spear-Phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Aparicio-Navarro, Francisco J.
    Rabie, Khaled
    Jabban, Ahmad
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [8] Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails
    Gascon, Hugo
    Ullrich, Steffen
    Stritter, Benjamin
    Rieck, Konrad
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 69 - 91
  • [9] Spear-Phishing Susceptibility Stemming From Personality Traits
    Eftimie, Sergiu
    Moinescu, Radu
    Racuciu, Ciprian
    IEEE ACCESS, 2022, 10 : 73548 - 73561
  • [10] A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies
    Tchakounte, Franklin
    Nyassi, Virgile Sime
    Danga, Duplex Elvis Houpa
    Udagepola, Kalum Priyanath
    Atemkeng, Marcellin
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2021, 8 (30) : 1 - 24