SCARECROW: Scalable Malware Reporting, Detection and Analysis

Malware is the main computer security threat that can cause damage to user's devices and company's infrastructure. End users who want to download executable files from the Internet are currently presented by a binary choice (OK or Cancel) but there is no viable third alternative for uncertainty (Not Sure). Reporting to any security agency or company for status inquiry regarding executable files normally lack of efficiency in terms of reporting back to the users in a timely manner. As a consequence, developing a more efficient approach that provide a prompt response to the users on reported suspicious files is important in order to encourage more end users engagement in malware reporting thus ultimately reducing the number of unknown malware in the wild. This study proposes a new automatic and scalable malware analyzer that is able to quickly scrutinize and help generate report for each malware detected. The implementation of the approach includes both the client (user's system) and the backend processing (security agency). The client side provides a user friendly and integrated reporting mechanism. The backend is based on both static and dynamic analysis for comprehensive malware detection and profiling. The backend utilizes cloud computing infrastructure to scale, speed up and automate the overall analysis and feedback processes. The system provides a win-win situation for both end user and security agency by providing sustainable and successful symbiotic anti-malware eco-system.

[1]  Wenke Lee,et al.  Ether: malware analysis via hardware virtualization extensions , 2008, CCS.

[2]  Kasmiran Jumari,et al.  Computer network intrusion detection software development , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).

[3]  Farnam Jahanian,et al.  CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.

[4]  Abdul Rahman Ramli,et al.  Malware analysis performance enhancement using cloud computing , 2013, Journal of Computer Virology and Hacking Techniques.

[5]  Andrés G. Castillo Sanz,et al.  Malware detection based on Cloud Computing integrating Intrusion Ontology representation , 2010 .

[6]  Xu Chen,et al.  Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[7]  Christopher Krügel,et al.  Detecting System Emulators , 2007, ISC.

[8]  Chen Lin,et al.  RkFinder: A Practical Anti-malware system Based on VMM , 2012 .

[9]  Yi Ming Chen,et al.  Retrospective Detection of Malware Attacks by Cloud Computing , 2010, CyberC 2010.

[10]  Samuel T. King,et al.  MAVMM: Lightweight and Purpose Built VMM for Malware Analysis , 2009, 2009 Annual Computer Security Applications Conference.

[11]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[12]  Xiuguo Wu MWfSCC: A Migrating Workflow System Based on Cloud Computing Paradigm , 2012 .

[13]  InduShobha N. Chengalur-Smith,et al.  An overview of social engineering malware: Trends, tactics, and implications , 2010 .

[14]  Ken Chiang,et al.  Farm: An automated malware analysis environment , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.

[15]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[16]  Rodney S. Tucker,et al.  Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport , 2011, Proceedings of the IEEE.

[17]  Lorenzo Martignoni,et al.  A Framework for Behavior-Based Malware Analysis in the Cloud , 2009, ICISS.

[18]  U. Bayer,et al.  TTAnalyze: A Tool for Analyzing Malware , 2006 .