期刊文献+

基于全局行为特征的未知恶意文档检测

Unknown Malicious Document Detection Based on Global Behavior Feature
下载PDF
导出
摘要 相比于基于宏的恶意办公文档,基于漏洞利用的恶意办公文档在攻击过程中往往不需要目标交互,能在目标无感的情况下完成攻击,已经成为APT攻击的重要手段,因此检测基于漏洞利用特别是未知漏洞利用的恶意文档对于发现APT攻击具有重要作用。当前的恶意文档检测方法主要围绕PDF文档展开,分为静态检测和动态检测两类,静态检测方法容易被攻击者规避,且无法发现基于远程载荷触发的漏洞利用,动态检测方法仅考虑PDF中JavaScript脚本或文档阅读器进程的行为特征,忽视了针对系统其他进程程序的间接攻击,存在检测盲区。针对上述问题,本文分析了恶意办公文档的攻击面,提出恶意文档威胁模型,并进一步实现一种基于全局行为特征的未知恶意文档检测方法,在文档处理过程中提取全系统行为特征,仅训练良性文档样本形成行为特征库用于恶意文档检测,并引入敏感行为特征用于降低检测误报率。本文在包含DOCX、RTF、DOC三种类型共计522个良性文档上进行训练获取行为特征库,然后在2088个良性文档样本和211个恶意文档样本上进行了测试,其中10个恶意样本为手动构造用于模拟几种典型的攻击场景。实验结果表明该方法在极低误报率(0.14%)的情况下能够检测出所有的恶意样本,具备检测利用未知漏洞的恶意文档的能力,进一步实验表明该方法也能够用于检测针对WPS Office软件进行漏洞利用的恶意文档。 Compared with malicious office documents based on macros,malicious office documents based on vulnerability exploitation often do not need target interaction in the attack process,and can complete the attack without target perception.It has become an important means of Advanced Persistent Threat(APT)attack.Therefore,detecting malicious documents based on vulnerability exploitation,especially unknown vulnerability exploitation,plays an important role in discovering APT attacks.The current malicious document detection methods mainly focus on PDF documents.It is mainly divided into two categories:static analysis and dynamic analysis.Static analysis is easy to be evaded by hackers,and can not discovery exploits triggered by remote payload.Dynamic analysis only considers the behaviors of the JavaScript in PDF or document reader’s process,ignoring the indirect attacks against other processes of the system,leads to a detection blind spot.To solve the above problems,we analyze the attack surface of malicious Office documents,come up with a threat model and implement an unknown malicious document detection method based on global behavior feature.In the process of document processing,the whole system behavior features are extracted,and only benign document samples are trained to form a behavior feature database for malicious document detection.In order to reduce false alarm rate,we introduce sensitive behavioral feature in detection.In this paper,522 benign documents including DOCX,RTF and DOC are trained to obtain the behavior feature database,and then 2088 benign document samples and 211 malicious document samples are tested.Of these,10 malicious samples are manually crafted to simulate several typical attack scenarios.The experimental results show that this method can detect all malicious samples with a very low false positive rate(0.14%)and is able to detect malicious documents that exploit unknown vulnerabilities.Further experiments show that this method can also be used to detect malicious documents exploiting WPS office software.
作者 陈祥 伊鹏 白冰 韩伟涛 CHEN Xiang;YI Peng;BAI Bing;HAN Weitao(Institute of Information Technology,PLA Strategic Force Information Engineering University,Zhengzhou 450002,China;ZheJiang Lab,Hangzhou 311121,China)
出处 《信息安全学报》 CSCD 2023年第5期96-108,共13页 Journal of Cyber Security
基金 国家自然科学基金(No.62176264)资助。
关键词 恶意文档检测 行为特征 威胁模型 漏洞利用 未知威胁 malicious document detection behavior feature threat model vulnerability exploitation unknown threat
  • 相关文献

参考文献2

二级参考文献24

  • 1Kumar S, Spafford E H. A generic virus scanner in c ++ [ C]//Proeeedings of the 8th Computer Security Applications Conference, 1992 : 210-219.
  • 2Sulaiman A, Ramamoorthy K, Mukkamala S, et al. Malware examiner using disassembled code(MEDIC) [ R]. Systems, Man and Cybernetics (SMC) Information Assurance Workshop,2005.
  • 3Kanzaki Y, Monden A, Nakamura M, et al. Exploiting self-modification mechanism for program protection[ C]//Proc of the 27th Annual International Computer Software and Applications Conference, 2003:170-181.
  • 4Bertrand A, Matias M, Koen D B. A model for self-modifying code[C]//The 8th Information Hiding Conference. Berlin Heidelberg, 2007 : 232-248.
  • 5Cmelik B,Keppel D. Shade: A fast instruction-set simulator for execution profiling [ C ]//Proceedings of the 1994 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems. Nashville, Tennessee, United States ,1994 :128-137.
  • 6Thomas E D. Metamorphism as a software protection for non-malicious Code[ J]. Air Force Inst Technology, 2006:8-11.
  • 7Christodorescu M, Kinder J, Jha S,et al. Malware normalization [ R ]. University of Wisconsin, Madison, USA,2005.
  • 8Sekar R, Bendre M, Bollineni P, et al. A fast automaton-based approach for detecting anomalous program behaviors [ C ]//IEEESymposium on Security and Privacy. 2001:144.
  • 9Hofmeyr S, Forrest S, Somayaji A. Intrusion detection using sequences of system calls[ J]. Journal of Computer Security, 1998 : 151-180.
  • 10Wespi A,Dacier M, Debar H. Intrusion detection using variable-length audit trail patterns[ J]. LNCS 1907, 2000:110-129.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部