SlideShare una empresa de Scribd logo
1 de 30
VMI based Malware Detection in
Virtualization Environment
Outline
• Introduction
• Motivation
• Objective
• Intrusion Detection System
• IDS Techniques
• VMI Techniques
• Types of hypervisors
• XEN Architecture
• VMI Tools
• DRAKVUF
• LibVMI
• Procedure
• Execution flow
• Bibliography
Introduction
• Hacking incidents are increasing day by day. Security
has become a major concern in such a technological
environment. Companies are investing lots of money on
the safety and confidentiality of data.
• The existing signature based techniques [1][2][3] store
the attack signatures. It requires the huge maintenance
of signature database.
• Other security approaches (signature-
based/static/dynamic) [4][5] in traditional environment
can be directly installed into the monitored machine.
• The main drawback with traditional security
tools is that if the system gets compromised,
these security processes also get compromised.
• Ex. Torpig and Config malware can disable the
security tool like Sophos.
• Hence, traditional security tools are not
efficient in the virtualization environment.
• Semantic Gap Issue
• They do not support advanced features such as
Virtual Machine Introspection (VMI) [6].
Motivation
With increasing hacking incidents, people and organizations
lose lots and lots of money as well as confidential data. So
we decided to come up with an approach which deals with
them.
The Biggest Cybersecurity Disaster of 2017 so far [7]:
• Shadow Brokers- The mysterious hacking group known
as the Shadow Brokers first surfaced in August 2016,
claiming to have breached the spy tools of the elite NSA-
linked operation known as the Equation Group.
• WannaCry- On May 12 a strain of ransomware called
WannaCry spread around the world, walloping hundreds of
thousands of targets, including public utilities and large
corporations.
Objective
• The aim of this project is, “to design and
analyze a malware detection approach
(particularly dynamic analysis) to detect
attacks outside the Virtual Machine (VM) by
making use of Virtual Machine Introspection
(VMI) ”.
• Petya/NotPetya/Nyetya/Goldeneye- A month or
so after WannaCry, another wave of ransomware
infections that partially leveraged Shadow
Brokers Windows exploits hit targets worldwide.
• Cloudbleed- In February, the internet
infrastructure company Cloudflare announced
that a bug in its platform caused random leakage
of potentially sensitive customer data.
• Wikileaks CIA Vault 7- On March 7,
WikiLeaks published a data trove containing
8,761 documents allegedly stolen from the CIA
that contained extensive documentation of
alleged spying operations and hacking tools.
IDS – Intrusion Detection System [8]
• a device or software application
• monitors a network or systems for malicious
activity or policy violations
• detected activity reported to admin or collected
centrally using a security information and event
management (SIEM) system.
• A SIEM system combines outputs from multiple
sources, and uses alarm filtering techniques to
distinguish malicious activity from false alarms.
IDS Techniques
IDS Techniques [9]
• Signature-Based malware detection: Signature-based detection
works by scanning the contents of computer files and cross-
referencing their contents with the “code signatures” belonging to
known viruses.
• Specification-based malware detection: Specification based
detection makes use of certain rule set of what is considered as
normal in order to decide the maliciousness of the program
violating the predefined rule set.
• Behavioral based Detection: The behaviour-based malware
detection system is composed of several applications, which
together provide the resources and mechanisms needed to detect
malware on the Android platform.
VMI Techniques[10]
In-VM
• avoids the semantic gap problem
• in-VM agent monitors the guest OS from the
inside
• exposes guest OS activities to the hypervisor
• Hypervisor role is to enable enforcement of the
desired security policies
Eg. Lares, SIM framework
Out-of-VM delivered
• mainly covers early and passive VMI techniques
• bridges the semantic gap using delivered semantic
information
• knowledge about guest OS internals and
location/definition of OS data structures of
interest is:
i. incorporated explicitly in the VMI system
ii. extracted from OS source code
iii. obtained through kernel symbols if available.
eg. Livewire, VMwatcher, XenAccess, Virtuoso
Out-of-VM derived
• Hardware architectures provide functionalities
such as multi-tasking, user privileges, memory
management and protection, system virtualization
• makes use of these functionalities to inspect guest
OS activities
• observes and interprets hardware states and events
• OS-agnostic, resistant to kernel data attacks and
to malware evasion
• We classify these VMI techniques into two
subcategories:
i. Trap handling-based- eg. Antifarm, Lycosid
ii. Trap forcing-based- eg. Ether, Nitro, Hypertap
Hybrid techniques
• uses combination of in-VM, delivered and
derived techniques
• achieves more robustness and reliability
• Extends range of possible VMI applications
• Four types-
i. Trap forcing-based- eg. Secvisor
ii. Data redirection- eg. NICKLE, VMST
iii. Process transplanting- eg. Process out-grafting
iv. Function call injection- eg. Syringe, Hypershell
Types of hypervisors[11]
There are two types of hypervisors:
Type 1:
• run directly on the system hardware.
• referred to as a "native" or "bare metal" or "embedded"
• building the hypervisor into the firmware is proving to be
more efficient
• provide higher performance, availability, and security
Type 2:
• run on a host OS
• During virtualization they were most popular.
• Admins could buy the software and install it on a server they
already had
• used mainly on client systems where efficiency is less
critical.
XEN Architecture
VMI Tools[12]
Lares [13] An Architecture for Secure Active Monitoring
Using Virtualization
• Host-based security tools such as anti-virus and intrusion
detection systems are not adequately protected on today's
computers.
• Malware is often designed to immediately disable any security
tools upon installation, rendering them useless.
• While current research has focused on moving these
vulnerable security tools into an isolated virtual machine, this
approach cripples security tools by preventing them from
doing active monitoring.
• This tool describes an architecture that takes a hybrid
approach, giving security tools the ability to do active
monitoring while still benefiting from the increased security of
an isolated virtual machine.
Lycosid [14]
• detect running hidden process
• compares lengths of two process list views,
one built using VMI while the other one is
obtained with in-gest utilities
• In-gest utility: is a high-speed client-side DB2®
utility that streams data from files and pipes
into DB2 target tables.
• correlation of the two views of per process
CPU time consumption allows to identify the
hidden process
DRAKVUF[15]
• a virtualization based agentless black-box
binary analysis system
• allows for in-depth execution tracing of
arbitrary binaries
• no special software required within the virtual
machine used for analysis
LibVMI[16]
• a C library with Python bindings
• makes it easy to monitor the low-level details
of a running virtual machine
• views its memory
• traps on hardware events
• accesses the vCPU registers
Procedure
Installing all the required softwares within the system.
• Installation of LibVMI, Xen hypervisor, partition Ubuntu, DRAKVUF and utility
updates.
Bringing the virus within the VM
• Downloading the malware dataset and run executables in the VM to look up for its
system calls.
Extracting system calls through VMI
• Then we’ll extract the system calls through VMI via Xen hypervisor by giving
various commands within the host OS terminal
Preparation of dataset
• Now we’ll prepare a dataset of all the normal as well as infected filed for further
procedures.
Feature Extraction
• Feature extraction is done i.e. frequency of particular system calls, appearance of
byte codes and strings is recorded for further evaluation (Bag of words).
Classification using Machine learning
• Now we’ll apply Machine learning using Python to classify the given files as
malicious or normal
Execution Flow of Approach
Bibliography
1. F. Anjum ; D. Subhadrabandhu ; S. Sarkar. Signature based intrusion detection for wireless ad-hoc networks: a
comparative study of various routing protocols. in: Vehicular Technology Conference, IEEE, 2003.
2. N Hubballi, V Suryanarayanan. False alarm minimization techniques in signature-based intrusion detection
systems: A survey. In: Computer Communications- Elsevier, 2014.
3. Y. Tang ; S. Chen. Defending against Internet worms: a signature-based approach. In: IEEE Computer and
Communications Societies, 2005.
4. 2017 P. Mishra, E.S.Pilli, V.Varadharajana, U.Tupakaula , “Intrusion detection techniques in cloud environment: A
survey.Journal of Network and Computer Applications 77 (2017), PP. 18-47.
5. M Almorsy, J Grundy, I Müller. An analysis of the cloud computing security problem. in - arXiv preprint
arXiv:1609.01107, arxiv.org, 2016
6. Yacine Hebbal ; Sylvie Laniepce ; Jean-Marc Menaud. Virtual Machine Introspection: Techniques and
Applications. in: Availability, Reliability and Security (ARES), 2015 10th International Conference , 2015.
7. https://www.wired.com/story/2017-biggest-hacks-so-far/
8. https://en.wikipedia.org/wiki/Intrusion_detection_system
9. http://www.forum-intrusion.com/archive/Intrusion%20Detection%20Techniques%20and%20Approaches.htm
10. Yacine Hebbal ; Sylvie Laniepce ; Jean-Marc Menaud. Virtual Machine Introspection: Techniques and
Applications, in : Availability, Reliability and Security (ARES), 2015 10th International Conference on, IEEE, 2015
11. http://searchservervirtualization.techtarget.com/feature/Whats-the-difference-between-Type-1-and-Type-2-
hypervisors
12. Yacine Hebbal ; Sylvie Laniepce ; Jean-Marc Menaud. Virtual Machine Introspection: Techniques and
Applications, in : Availability, Reliability and Security (ARES), 2015 10th International Conference on, IEEE, 2015
13. B. Payne, M. Carbone, M. Sharif, and W. Lee, “Lares: An architecture for secure active monitoring using
virtualization,” in Security and Privacy, 2008. SP 2008. IEEE Symposium on, pp. 233–247, May 2008.
14. B. D. Payne, M. De Carbone, and W. Lee, “Secure and flexible monitoring of virtual machines,” in Computer
Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, pp. 385–397, IEEE, 2007.
15. https://drakvuf.com/
16. http://libvmi.com/
Thank you
Working on IDA-Pro
• Disassembling Steam.exe
Screenshots while installation DRAKVUF
Starting the VM
Seeing the process list in VM
Seeing the system calls in VM

Más contenido relacionado

La actualidad más candente

AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
johnb0118
 

La actualidad más candente (20)

Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
1776 1779
1776 17791776 1779
1776 1779
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 
intruders types ,detection & prevention
intruders types ,detection & preventionintruders types ,detection & prevention
intruders types ,detection & prevention
 
Intruders
IntrudersIntruders
Intruders
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 

Similar a VMI based malware detection in virtual environment

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS Defenders
Dragos, Inc.
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
amiyadutta
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
AuliaArifWardana
 

Similar a VMI based malware detection in virtual environment (20)

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS Defenders
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devices
 
Network security
Network securityNetwork security
Network security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
Cyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptxCyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptx
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Último (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

VMI based malware detection in virtual environment

  • 1. VMI based Malware Detection in Virtualization Environment
  • 2. Outline • Introduction • Motivation • Objective • Intrusion Detection System • IDS Techniques • VMI Techniques • Types of hypervisors • XEN Architecture • VMI Tools • DRAKVUF • LibVMI • Procedure • Execution flow • Bibliography
  • 3. Introduction • Hacking incidents are increasing day by day. Security has become a major concern in such a technological environment. Companies are investing lots of money on the safety and confidentiality of data. • The existing signature based techniques [1][2][3] store the attack signatures. It requires the huge maintenance of signature database. • Other security approaches (signature- based/static/dynamic) [4][5] in traditional environment can be directly installed into the monitored machine.
  • 4. • The main drawback with traditional security tools is that if the system gets compromised, these security processes also get compromised. • Ex. Torpig and Config malware can disable the security tool like Sophos. • Hence, traditional security tools are not efficient in the virtualization environment. • Semantic Gap Issue • They do not support advanced features such as Virtual Machine Introspection (VMI) [6].
  • 5. Motivation With increasing hacking incidents, people and organizations lose lots and lots of money as well as confidential data. So we decided to come up with an approach which deals with them. The Biggest Cybersecurity Disaster of 2017 so far [7]: • Shadow Brokers- The mysterious hacking group known as the Shadow Brokers first surfaced in August 2016, claiming to have breached the spy tools of the elite NSA- linked operation known as the Equation Group. • WannaCry- On May 12 a strain of ransomware called WannaCry spread around the world, walloping hundreds of thousands of targets, including public utilities and large corporations.
  • 6. Objective • The aim of this project is, “to design and analyze a malware detection approach (particularly dynamic analysis) to detect attacks outside the Virtual Machine (VM) by making use of Virtual Machine Introspection (VMI) ”.
  • 7. • Petya/NotPetya/Nyetya/Goldeneye- A month or so after WannaCry, another wave of ransomware infections that partially leveraged Shadow Brokers Windows exploits hit targets worldwide. • Cloudbleed- In February, the internet infrastructure company Cloudflare announced that a bug in its platform caused random leakage of potentially sensitive customer data. • Wikileaks CIA Vault 7- On March 7, WikiLeaks published a data trove containing 8,761 documents allegedly stolen from the CIA that contained extensive documentation of alleged spying operations and hacking tools.
  • 8. IDS – Intrusion Detection System [8] • a device or software application • monitors a network or systems for malicious activity or policy violations • detected activity reported to admin or collected centrally using a security information and event management (SIEM) system. • A SIEM system combines outputs from multiple sources, and uses alarm filtering techniques to distinguish malicious activity from false alarms.
  • 10. IDS Techniques [9] • Signature-Based malware detection: Signature-based detection works by scanning the contents of computer files and cross- referencing their contents with the “code signatures” belonging to known viruses. • Specification-based malware detection: Specification based detection makes use of certain rule set of what is considered as normal in order to decide the maliciousness of the program violating the predefined rule set. • Behavioral based Detection: The behaviour-based malware detection system is composed of several applications, which together provide the resources and mechanisms needed to detect malware on the Android platform.
  • 11. VMI Techniques[10] In-VM • avoids the semantic gap problem • in-VM agent monitors the guest OS from the inside • exposes guest OS activities to the hypervisor • Hypervisor role is to enable enforcement of the desired security policies Eg. Lares, SIM framework
  • 12. Out-of-VM delivered • mainly covers early and passive VMI techniques • bridges the semantic gap using delivered semantic information • knowledge about guest OS internals and location/definition of OS data structures of interest is: i. incorporated explicitly in the VMI system ii. extracted from OS source code iii. obtained through kernel symbols if available. eg. Livewire, VMwatcher, XenAccess, Virtuoso
  • 13. Out-of-VM derived • Hardware architectures provide functionalities such as multi-tasking, user privileges, memory management and protection, system virtualization • makes use of these functionalities to inspect guest OS activities • observes and interprets hardware states and events • OS-agnostic, resistant to kernel data attacks and to malware evasion • We classify these VMI techniques into two subcategories: i. Trap handling-based- eg. Antifarm, Lycosid ii. Trap forcing-based- eg. Ether, Nitro, Hypertap
  • 14. Hybrid techniques • uses combination of in-VM, delivered and derived techniques • achieves more robustness and reliability • Extends range of possible VMI applications • Four types- i. Trap forcing-based- eg. Secvisor ii. Data redirection- eg. NICKLE, VMST iii. Process transplanting- eg. Process out-grafting iv. Function call injection- eg. Syringe, Hypershell
  • 15. Types of hypervisors[11] There are two types of hypervisors: Type 1: • run directly on the system hardware. • referred to as a "native" or "bare metal" or "embedded" • building the hypervisor into the firmware is proving to be more efficient • provide higher performance, availability, and security Type 2: • run on a host OS • During virtualization they were most popular. • Admins could buy the software and install it on a server they already had • used mainly on client systems where efficiency is less critical.
  • 17. VMI Tools[12] Lares [13] An Architecture for Secure Active Monitoring Using Virtualization • Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today's computers. • Malware is often designed to immediately disable any security tools upon installation, rendering them useless. • While current research has focused on moving these vulnerable security tools into an isolated virtual machine, this approach cripples security tools by preventing them from doing active monitoring. • This tool describes an architecture that takes a hybrid approach, giving security tools the ability to do active monitoring while still benefiting from the increased security of an isolated virtual machine.
  • 18. Lycosid [14] • detect running hidden process • compares lengths of two process list views, one built using VMI while the other one is obtained with in-gest utilities • In-gest utility: is a high-speed client-side DB2® utility that streams data from files and pipes into DB2 target tables. • correlation of the two views of per process CPU time consumption allows to identify the hidden process
  • 19. DRAKVUF[15] • a virtualization based agentless black-box binary analysis system • allows for in-depth execution tracing of arbitrary binaries • no special software required within the virtual machine used for analysis
  • 20. LibVMI[16] • a C library with Python bindings • makes it easy to monitor the low-level details of a running virtual machine • views its memory • traps on hardware events • accesses the vCPU registers
  • 21. Procedure Installing all the required softwares within the system. • Installation of LibVMI, Xen hypervisor, partition Ubuntu, DRAKVUF and utility updates. Bringing the virus within the VM • Downloading the malware dataset and run executables in the VM to look up for its system calls. Extracting system calls through VMI • Then we’ll extract the system calls through VMI via Xen hypervisor by giving various commands within the host OS terminal Preparation of dataset • Now we’ll prepare a dataset of all the normal as well as infected filed for further procedures. Feature Extraction • Feature extraction is done i.e. frequency of particular system calls, appearance of byte codes and strings is recorded for further evaluation (Bag of words). Classification using Machine learning • Now we’ll apply Machine learning using Python to classify the given files as malicious or normal
  • 22. Execution Flow of Approach
  • 23. Bibliography 1. F. Anjum ; D. Subhadrabandhu ; S. Sarkar. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols. in: Vehicular Technology Conference, IEEE, 2003. 2. N Hubballi, V Suryanarayanan. False alarm minimization techniques in signature-based intrusion detection systems: A survey. In: Computer Communications- Elsevier, 2014. 3. Y. Tang ; S. Chen. Defending against Internet worms: a signature-based approach. In: IEEE Computer and Communications Societies, 2005. 4. 2017 P. Mishra, E.S.Pilli, V.Varadharajana, U.Tupakaula , “Intrusion detection techniques in cloud environment: A survey.Journal of Network and Computer Applications 77 (2017), PP. 18-47. 5. M Almorsy, J Grundy, I Müller. An analysis of the cloud computing security problem. in - arXiv preprint arXiv:1609.01107, arxiv.org, 2016 6. Yacine Hebbal ; Sylvie Laniepce ; Jean-Marc Menaud. Virtual Machine Introspection: Techniques and Applications. in: Availability, Reliability and Security (ARES), 2015 10th International Conference , 2015. 7. https://www.wired.com/story/2017-biggest-hacks-so-far/ 8. https://en.wikipedia.org/wiki/Intrusion_detection_system 9. http://www.forum-intrusion.com/archive/Intrusion%20Detection%20Techniques%20and%20Approaches.htm 10. Yacine Hebbal ; Sylvie Laniepce ; Jean-Marc Menaud. Virtual Machine Introspection: Techniques and Applications, in : Availability, Reliability and Security (ARES), 2015 10th International Conference on, IEEE, 2015 11. http://searchservervirtualization.techtarget.com/feature/Whats-the-difference-between-Type-1-and-Type-2- hypervisors 12. Yacine Hebbal ; Sylvie Laniepce ; Jean-Marc Menaud. Virtual Machine Introspection: Techniques and Applications, in : Availability, Reliability and Security (ARES), 2015 10th International Conference on, IEEE, 2015 13. B. Payne, M. Carbone, M. Sharif, and W. Lee, “Lares: An architecture for secure active monitoring using virtualization,” in Security and Privacy, 2008. SP 2008. IEEE Symposium on, pp. 233–247, May 2008. 14. B. D. Payne, M. De Carbone, and W. Lee, “Secure and flexible monitoring of virtual machines,” in Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, pp. 385–397, IEEE, 2007. 15. https://drakvuf.com/ 16. http://libvmi.com/
  • 25.
  • 26. Working on IDA-Pro • Disassembling Steam.exe
  • 29. Seeing the process list in VM
  • 30. Seeing the system calls in VM