Targeted Malicious Email Detection Using Hypervisor-Based Dynamic Analysis and Ensemble Learning

Jian Zhang, Wenzhen Li, Liangyi Gong, Zhaojun Gu, Jeffrey Wu
{"title":"Targeted Malicious Email Detection Using Hypervisor-Based Dynamic Analysis and Ensemble Learning","authors":"Jian Zhang, Wenzhen Li, Liangyi Gong, Zhaojun Gu, Jeffrey Wu","doi":"10.1109/GLOBECOM38437.2019.9014069","DOIUrl":null,"url":null,"abstract":"At present, email is still one of the most frequently used communication tools for organizations and individuals. With the leakage of personal privacy information, targeted malicious email (TME) is becoming a prominent targeted cyber attack vector in today's Internet. This type of attack often uses personal information, about an individual, group of individuals, or an organization, to make a TME more believable and personalized. TME is effective to penetrate email defense system because it is fundamentally difficult for traditional email security method to distinguish legitimate emails from malicious emails. And TMEs often contain malicious URLs or malicious attachments, which are extremely aggressive and destructive. In order to effectively deal with this new type of malicious email attack, this paper proposes a dynamic detection method for malicious email. We simulate the recipient opening the email in the virtual machine (VM), accessing the URL and activating the attachment. And we use the virtual machine introspection (VMI) and memory forensics analysis (MFA) technology to obtain the dynamic features of the email by the out-of-VM. Then we use AdaBoostM1 ensemble learning method and Voting combination strategy to combine three base classifiers such as BayesNet, SMO and J48 to build a powerful classification model for detecting TME attacks. The AdaBoostM1 classifier achieved the high detection rates, with an AUC of 0.997, true positive rate (TPR) of 0.997, and false positive rate (FPR) of 0.015. In addition, our proposed detection method is superior to the 56 anti-virus engines on VirusTotal and most of the existing research works.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"7 8 Suppl 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Global Communications Conference (GLOBECOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOBECOM38437.2019.9014069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

At present, email is still one of the most frequently used communication tools for organizations and individuals. With the leakage of personal privacy information, targeted malicious email (TME) is becoming a prominent targeted cyber attack vector in today's Internet. This type of attack often uses personal information, about an individual, group of individuals, or an organization, to make a TME more believable and personalized. TME is effective to penetrate email defense system because it is fundamentally difficult for traditional email security method to distinguish legitimate emails from malicious emails. And TMEs often contain malicious URLs or malicious attachments, which are extremely aggressive and destructive. In order to effectively deal with this new type of malicious email attack, this paper proposes a dynamic detection method for malicious email. We simulate the recipient opening the email in the virtual machine (VM), accessing the URL and activating the attachment. And we use the virtual machine introspection (VMI) and memory forensics analysis (MFA) technology to obtain the dynamic features of the email by the out-of-VM. Then we use AdaBoostM1 ensemble learning method and Voting combination strategy to combine three base classifiers such as BayesNet, SMO and J48 to build a powerful classification model for detecting TME attacks. The AdaBoostM1 classifier achieved the high detection rates, with an AUC of 0.997, true positive rate (TPR) of 0.997, and false positive rate (FPR) of 0.015. In addition, our proposed detection method is superior to the 56 anti-virus engines on VirusTotal and most of the existing research works.
基于hypervisor的动态分析和集成学习的针对性恶意邮件检测
目前,电子邮件仍然是组织和个人最常用的沟通工具之一。随着个人隐私信息的泄露,针对性恶意邮件(TME)正在成为当今互联网上一个突出的针对性网络攻击载体。这种类型的攻击通常使用个人信息,关于一个人、一群人或一个组织,使TME更加可信和个性化。由于传统的邮件安全方法从根本上难以区分合法邮件和恶意邮件,因此TME可以有效地穿透邮件防御系统。tme通常包含恶意url或恶意附件,这些内容极具攻击性和破坏性。为了有效应对这种新型的恶意邮件攻击,本文提出了一种针对恶意邮件的动态检测方法。我们模拟收件人在虚拟机(VM)中打开电子邮件,访问URL并激活附件。利用虚拟机内省(VMI)和内存取证分析(MFA)技术,通过虚拟机外获取电子邮件的动态特征。然后,我们采用AdaBoostM1集成学习方法和投票组合策略,将BayesNet、SMO和J48三种基本分类器组合在一起,构建了强大的TME攻击检测分类模型。AdaBoostM1分类器具有较高的检出率,AUC为0.997,真阳性率(TPR)为0.997,假阳性率(FPR)为0.015。此外,我们提出的检测方法优于VirusTotal上的56个反病毒引擎和大多数现有的研究工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信