Top Banner
Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao
15

Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Jan 18, 2016

Download

Documents

Claire Ellis
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Advanced Malware Detection

Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao

Page 2: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Problem

Detection systems relying on static malicious signatures are no longer enough.

Amount of malware increasing exponentially

Smarter malware

Page 3: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Goals

Detection based on behavior

API signatures

Multi-factor classification techniques

Naïve Bayes, SVM, Kth nearest

Automation of database maintenance

Updates

Page 4: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

System Architecture

Database creation

Database link

API extraction

API signature generation

Classification models

User interface

Page 5: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Database Creation

Installation and creation of MySQL server

Creation of database and tables

Page 6: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Database Link

Installation of connector

Physical connection between visual studio and MySQL

Page 7: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

API Extraction

Access the import table of each executable file in our sample directory

Loop through each API call for two purposes

Populate the API table

Generate behavioral signature

Page 8: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

API Signature Generation

Similarly to extraction we are looping through all of the API calls

This time though we are comparing them with the database rather than adding them to it.

Page 9: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Classification: Naïve Bayes

Page 10: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

User Interface

Simple window allows user to select the directory they want to scan

Page 11: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Current Accomplishments

Database and table creation

API Extraction

API Signature Generation

Page 12: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Remaining Work

Implementation of classification model

User interface

Page 13: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Business Potential

Two marketing options

Subscription based

Licensing

Sell out and get bought up by a real company

Page 14: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Future Development Potential

Implementation of multiple classification methods

Support for packed and encrypted files

Improved speed and stability through a different database

Page 15: Advanced Malware Detection Group 8: Alex Finkelstein, Josh Suess, Dom Amos, Mike Hite, Kevin Hao.

Questions?