Teaching Static Call Analysis to Detect Anomalous Software Behavior

نویسندگان

  • Jordan Shropshire
  • Philip Menard
چکیده

Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the right level of detail for undergraduate information systems students. Some instructors provide only superfluous descriptions of malware, others delve into in-depth reviews of application code. This paper advocates an approach which teaches the fundamentals of code analysis to nonprogrammers. The approaches integrates visualization tools such as flame graphs to help students interpret software behavior. It has been found to be especially valuable for upper division information systems courses on cyber security. Disciplines Curriculum and Instruction | Information Security | Management Information Systems | Technology and Innovation This event is available at DigitalCommons@Kennesaw State University: http://digitalcommons.kennesaw.edu/ccerp/2016/ Academic/1

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Online Anomaly Detection for Service-Oriented Components in OSGi-based Applications

OSGi has become one of the most promising frameworks for managing service-oriented and component-based applications. The OSGi-based service-oriented components delivered by different vendors are usually black-box program units which lack source code and design documents. Thus, it is difficult to evaluate their quality by static code analysis, and the defective components may lead to the failure...

متن کامل

Detecting Anomalous Application Behaviors Using a System Call Clustering Method over Critical Resources

Malware attacks which focus on exploiting an application to launch the payload have become major security threat. We present the methodology and algorithm which is able to detect anomaly in application behavior and prevent such type of attacks. Our approach is to represent the normal behavior of an application, detect deviations from this normal behavior and prevent them. We represent normal be...

متن کامل

Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks

The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real and contemporary problem. If the problem remains unchecked then it may become as potent as email spam today. In this paper, we present two approaches to detect and prevent SPITting over the Internet. Both of our approaches are based on the anomaly detection of the distributions of selected call features (i...

متن کامل

Applying Knowledge Discovery in Database Techniques in Modeling Packet Header Anomaly Intrusion Detection Systems

This paper describes packet header anomaly intrusion detection system modeling. The essence of the discussion in this paper is on applying knowledge discovery in database technique to produce expert production rules which is one of the main components of our model which we call as Protocol based Packet Header Anomaly Detector (PbPHAD) Intrusion Detection System. PbPHAD is designed to detect the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016