Title
Machine Learning and Recognition of User Tasks for Malware Detection
Abstract
Malware often act on a compromised machine with the identifier of a legitimate user. We analyzed numerous malware and user tasks, and found subtle differences between how the two operate on a machine. We have developed a machine learning approach that characterizes user tasks through their resource utilization. We have found that many routine user tasks retain their resource utilization patterns, despite the occurrence of new dynamics each time a user carries out those tasks. On the other hand, upon landing on a target machine, malware perform a substantial amount of work to explore the machine and discover resources that are of interest to threat actors. Our approach collects live performance counter data from the operating system kernel, and subsequently pre-processes and analyzes those data to learn and then recognize the resource utilization of a task. We develop decoy process mechanisms that camouflage performance counter data to prevent malware from learning the resource utilization of a user task. We tested our approach against both legitimate users in real-world work settings and malware samples, and discuss our findings in the paper.
Year
DOI
Venue
2019
10.1109/TPS-ISA48467.2019.00018
2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
Keywords
DocType
ISBN
Malware, compromised computer account, Machine learning,decoy process mechanisms
Conference
978-1-7281-6742-8
Citations 
PageRank 
References 
0
0.34
9
Authors
4
Name
Order
Citations
PageRank
Yasamin Alagrash101.01
Nithasha Mohan200.34
Sandhya Rani Gollapalli300.34
Julian L. Rrushi421.74