Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
スポンサーリンク
概要
- 論文の詳細を見る
Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malwares vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.
- (社)電子情報通信学会の論文
- 2009-05-01
著者
-
INOUE Daisuke
National Institute of Information and Communications Technology
-
ETO Masashi
National Institute of Information and Communications Technology
-
NAKAO Koji
National Institute of Information and Communications Technology
-
YOSHIOKA Katsunari
Yokohama National University
-
HOSHIZAWA Yuji
SecureBrain Corporation
-
NOGAWA Hiroki
Secure Ware Inc.
-
Yoshioka K
The Graduate School Of Environment And Information Sciences Yokohama National University
-
Inoue Daisuke
National Institute Of Information And Communicarions Technology
-
NAKAO Koji
the National Institute of Information and Communications Technology (NICT)
関連論文
- O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks
- Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
- Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
- Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
- Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
- Special Section on Information Theory and Its Applications
- Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems
- O-means : An Optimized Clustering Method for Analyzing Spam Based Attacks
- A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
- On Collusion Security of Random Codes(Biometrics)(Cryptography and Information Security)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Random-Error-Resilient Tracing Algorithm for a Collusion-Secure Fingerprinting Code (特集 電子社会に向けたコンピュータセキュリティ技術)
- P2P Network Traffic Analysis Using Data Mining Engines
- A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
- An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Catching the Behavioral Differences between Multiple Executions for Malware Detection
- An Accurate Packer Identification Method Using Support Vector Machine
- Design and Implementation of Security for HIMALIS Architecture of Future Networks
- Towards Cost-Effective P2P Traffic Classification in Cloud Environment
- Catching the Behavioral Differences between Multiple Executions for Malware Detection