Główne pojęcia
PARIS is a novel system that addresses the limitations of existing malware detection methods by using adaptive trace fetching to enable real-time, low-overhead detection of malicious behavior on Windows systems.
Streszczenie
PARIS: A Practical, Adaptive Trace-Fetching and Real-Time Malicious Behavior Detection System
This research paper introduces PARIS, a novel system designed for real-time detection of malicious behavior in Windows environments. The authors highlight the increasing sophistication of cyberattacks, particularly Advanced Persistent Threats (APTs), which often employ stealth tactics to evade traditional detection methods.
Existing static analysis methods are limited in their ability to detect obfuscated or polymorphic malware, while traditional dynamic monitoring approaches struggle with high overhead and evasion techniques. PARIS addresses these challenges by leveraging Event Tracing for Windows (ETW) to selectively collect and analyze maliciousness-related API call stacks, significantly reducing data overhead while maintaining high detection accuracy.
Key Innovations of PARIS:
- Adaptive Trace Fetching: PARIS dynamically identifies and collects only the most relevant API call stacks, minimizing resource consumption. This is achieved through graph-based API selection, API association analysis, call stack selection, and loop compression techniques.
- Real-time Behavior Detection: By reducing data overhead, PARIS enables real-time analysis of process behavior, allowing for timely detection and response to threats.
- Focus on Malicious Behaviors: PARIS prioritizes the identification of malicious behaviors (Potential Harmful Functions - PHFs) commonly observed in APT attacks, providing deeper insights into attacker tactics and intentions.
Methodology:
The researchers developed a prototype of PARIS and evaluated its performance in real-world settings using both benign and malicious datasets. They assessed system overhead, accuracy of behavior recognition, and the impact of different models and parameters.
Key Findings:
- Significant Data Reduction: PARIS achieved over 98.8% reduction in data size compared to raw ETW traces, leading to substantial savings in memory, bandwidth, and CPU usage.
- Low Overhead: PARIS demonstrated minimal impact on system performance, with an average memory usage of 32MB, bandwidth of 0.77kb/s, and CPU usage of 4.79%.
- High Detection Accuracy: Despite the significant data reduction, PARIS maintained a high detection accuracy of 93.6%, comparable to offline methods.
Significance:
PARIS represents a significant advancement in real-time malware detection by effectively balancing the trade-off between overhead and accuracy. Its ability to identify malicious behaviors in real-time with minimal system impact makes it a valuable tool for enhancing cybersecurity posture.
Limitations and Future Research:
The authors acknowledge the reliance on the assumption that ETW remains uncompromised. Future research could explore methods to enhance the resilience of PARIS against potential attacks targeting the ETW framework. Additionally, expanding the system's capabilities to encompass other operating systems beyond Windows would broaden its applicability.
Statystyki
PARIS can reduce over 98.8% of data compared to the raw ETW trace.
PARIS can run stably on the client for a long time with an average resource overhead of 32MB memory usage and 4.79% CPU usage.
PARIS transmits at an average network bandwidth of 0.77kb/s.
PARIS achieves a detection accuracy of 93.6%.