US20220030016A1 - Malware analysis method, malware analysis device, and malware analysis system - Google Patents
Malware analysis method, malware analysis device, and malware analysis system Download PDFInfo
- Publication number
- US20220030016A1 US20220030016A1 US17/396,894 US202117396894A US2022030016A1 US 20220030016 A1 US20220030016 A1 US 20220030016A1 US 202117396894 A US202117396894 A US 202117396894A US 2022030016 A1 US2022030016 A1 US 2022030016A1
- Authority
- US
- United States
- Prior art keywords
- malware
- analysis
- communication
- response
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Definitions
- the present invention relates to a malware analysis method, a malware analysis device, and a malware analysis system, capable of analyzing malware easily.
- malware malicious programs
- computer viruses such as computer viruses or spyware
- bots which bring threats such as information leakage and destruction of data.
- malware which infects a computer (e.g., an information terminal such as a personal computer) to connect the infected computer to a C&C (Command & Control) server.
- the C&C server sends commands to the malware to operate the computer by remote control.
- the computer infected with the malware is made communicable with the C&C server.
- the computer communicates with the C&C server, there is a possibility that the computer will suffer damage. Further, when the C&C server no longer exists, the dynamic analysis cannot be performed.
- Patent Literature 1 discloses a technique for examining what kind of communication malware performs and what impact the malware has on internal resources of a computer.
- Patent Literature 1 determines a communication protocol when the malware performs communication. Then, a pseudo response (dummy response) from a server predetermined according to the communication protocol is transmitted to the malware. Thus, the malware is dynamically analyzed even in such a situation that actual communication with the C&C server is not performed.
- a preferred aspect of a malware analysis method includes: determining whether communication by malware occurs when the malware is dynamically analyzed; suspending communication when the communication by the malware occurs to present a request to perform static analysis; and setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- a preferred aspect of a malware analysis device includes: a dynamic analysis unit which performs dynamic analysis of malware; a communication determination unit which determines whether communication by the malware occurs when the dynamic analysis unit performs dynamic analysis; a static analysis requesting unit which suspends communication when the communication determination unit determines that the communication by the malware occurs to present a request to perform static analysis; and a setting changing unit which sets a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- a preferred aspect of a malware analysis system includes a malware analysis device and a pseudo response server which transmits, to malware, a pseudo response as a response expected by the malware, wherein the malware analysis device includes: a dynamic analysis unit which performs dynamic analysis of the malware; a communication determination unit which determines whether communication by the malware occurs when the dynamic analysis unit performs dynamic analysis; a static analysis requesting unit which suspends communication when the communication determination unit determines that the communication by the malware occurs to present a request to perform static analysis; and a setting changing unit which sets the pseudo response server to make a response obtained by the static analysis as being expected by the malware.
- a preferred aspect of a malware analysis program causes a computer to execute: a process of determining whether communication by malware occurs when the malware is dynamically analyzed; a process of suspending communication when the communication by the malware occurs to present a request to perform static analysis; and a process of setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- malware can be analyzed more easily.
- FIG. 1 It depicts a block diagram illustrating an exemplary embodiment of a malware analysis system including a malware analysis device.
- FIG. 2 It depicts a flowchart illustrating an operation example of the malware analysis device.
- FIG. 3 It depicts a table for describing an example of information stored in a storing database.
- FIG. 4 It depicts a block diagram illustrating a configuration example of an information processing system in which the functions of a malware analysis device can be implemented.
- FIG. 5 It depicts a block diagram illustrating the main part of a malware analysis device.
- FIG. 6 It depicts a block diagram illustrating the main part of another aspect of the malware analysis device.
- FIG. 7 It depicts a block diagram illustrating the main part of still another aspect of the malware analysis device.
- FIG. 8 It depicts a block diagram illustrating the main part of a malware analysis system.
- FIG. 9 It depicts a block diagram illustrating the main part of another aspect of the malware analysis system.
- FIG. 10 It depicts a block diagram illustrating the main part of still another aspect of the malware analysis system.
- FIG. 1 is a block diagram illustrating an exemplary embodiment of a malware analysis system including a malware analysis device.
- a malware analysis device 100 in the malware analysis system is connected to a sinkhole server 200 through an open flow switch 301 .
- the sinkhole server 200 is used in a path for communication performed by malware.
- malware performs communication actually means that resources (a communication interface, and the like, which are typified by a communication unit 107 in FIG. 1 ) of a device in which the malware exists perform communication according to the malware.
- the malware analysis device 100 is also connected directly to the sinkhole server 200 and the open flow controller 300 .
- the reason for being directly connected is that the malware analysis device 100 controls the sinkhole server 200 and the open flow controller 300 .
- the open flow controller 300 is to control the open flow switch 301 .
- the malware analysis device 100 includes a control unit 101 , a static analysis control unit 102 , a dynamic analysis control unit 103 , a setting changing unit 104 , an analysis result database (DB) 105 , a malware execution unit 106 , a communication unit 107 , and a response storing database (DB) 108 .
- DB analysis result database
- DB malware execution unit
- the control unit 101 controls each of the functions of the malware analysis device 100 .
- the static analysis control unit 102 performs control for static analysis of malware.
- the dynamic analysis control unit 103 performs control of dynamic analysis of malware.
- the setting changing unit 104 changes the settings of the sinkhole server 200 and the open flow controller 300 .
- the analysis result database 105 stores the analysis results of malware.
- the malware execution unit 106 executes malware to analyze the malware.
- the communication unit 107 performs communication with the sinkhole server 200 , the open flow controller 300 , and the open flow switch 301 .
- the response storing database 108 stores a response expected by malware when the malware performs communication, and a setting method therefor.
- the response expected by malware is an IP address of the C&C server, a web access response to check the Internet connection, a command from the C&C server to run the malware, or the like.
- the sinkhole server 200 includes a response generation unit 201 which returns an expected response when the malware performs communication, and a communication unit 202 which performs communication.
- the sinkhole server 200 is set as a server configured to absorb the traffic of malware in order to analyze the malware.
- the sinkhole server 200 supplies, to malware, a response expected by the malware (a pseudo response in fact) on behalf of the C&C server, for example.
- FIG. 2 is a flowchart illustrating an operation example of the malware analysis device 100 .
- initialization processing is first performed (step S 201 ).
- the control unit 101 instructs the malware execution unit 106 to prepare an environment appropriate for the malware to be analyzed through the dynamic analysis control unit 103 .
- the malware execution unit 106 configures the settings of a CPU (Central Processing Unit), a memory and a disk, an OS (Operating System) and an application, and the like, required to run the malware to be analyzed.
- control unit 101 sends the setting changing unit 104 an initialization instruction.
- the setting changing unit 104 that received the initialization instruction instructs, through the communication unit 107 , the sinkhole server 200 and the open flow controller 300 to perform initialization.
- the sinkhole server 200 performs initialization processing in response to the instruction such as to clear the response generation.
- the open flow controller 300 performs processing to clear a flow table of the open flow switch 301 in response to the instruction.
- step S 202 the malware execution unit 106 executes the malware.
- the dynamic analysis control unit 103 monitors the execution status of the malware. Then, the dynamic analysis control unit 103 stores, in the analysis result database 105 , information such as access of the malware to a file, process execution, API (Application Programming Interface) calling, communication destination, and the like.
- API Application Programming Interface
- step S 203 the dynamic analysis control unit 103 determines whether the malware performs communication. When it is determined that communication is performed, the procedure proceeds to step S 204 . When it is determined that communication is not performed, the procedure moves to step S 206 . For example, the dynamic analysis control unit 103 can check whether the communication unit 107 operates to determine whether the malware performs communication.
- the malware execution unit 106 transmits a packet to the open flow switch 301 through the communication unit 107 . Since there is no entry of information related to the packet in the flow table, the open flow switch 301 forwards the packet to the open flow controller 300 to make an inquiry about the packet. The open flow controller 300 that received the packet holds the received packet intact when the processing step S 203 is executed.
- a malware analyst makes a static analysis of the malware in step S 204 to set a response expected by the malware.
- the malware execution unit 106 suspends the processing according to an instruction, for example, from the dynamic analysis control unit 103 .
- the communication from the malware is suspended temporarily.
- the malware analysis device 100 performs the following processing as an example.
- the dynamic analysis control unit 103 provides a display on a display unit (unillustrated in FIG. 1 ) of the malware analysis device 100 or a display device connected to the malware analysis device 100 through the control unit 101 to indicate that the malware does not perform communication, or a display to recommend that the static analysis should be made.
- the malware analyst When making the static analysis, the malware analyst requests the dynamic analysis results stored in the analysis result database 105 , the register of the malware execution unit 106 , the state of the memory, assembly code of the malware, and the like from the control unit 101 through an input unit (unillustrated in FIG. 1 ) in the malware analysis device 100 or an input device connected to the malware analysis device 100 .
- the control unit 101 transfers the input request to the static analysis control unit 102 and the malware execution unit 106 .
- Information as the answer to the request is output, for example, from the static analysis control unit 102 and the malware execution unit 106 to the display unit or the display device through the control unit 101 .
- the malware analyst finds a response expected by the malware.
- the found response expected by the malware is input, for example, from the input unit or the input device to the control unit 101 or the setting changing unit 104 .
- the control unit 101 stores the response expected by the malware in the response storing database 108 through the setting changing unit 104 .
- the setting changing unit 104 stores the response expected by malware in the response storing database 108 .
- FIG. 3 is a table for describing an example of information stored in the response storing database 108 .
- flow information to be applied to the open flow switch 301 to transfer communication to the sinkhole server 200 , an expected response, and a setting method required to return the response to the sinkhole server 200 are stored for each combination of a specific API and an argument in the response storing database 108 .
- the setting method includes a program or a script, a setting file, and the like.
- the API and the argument are set in the response storing database 108 , but a different condition may also be set.
- assembly code may be set instead of the API.
- an object state, or the state of the register or the memory may be set instead of the argument.
- the address of an instruction during execution of the malware may be set.
- step S 205 the control unit 101 instructs the setting changing unit 104 to configure the settings for the sinkhole server 200 and the open flow controller 300 based on the information stored in the response storing database 108 .
- the setting changing unit 104 executes the settings for the response generation unit 201 of the sinkhole server 200 through the communication unit 107 according to the expected response and the setting method stored in the response storing database 108 .
- the setting changing unit 104 sets the response generation unit 201 so that the sinkhole server 200 will return the response expected by the malware.
- the setting changing unit 104 transmits, to the open flow controller 300 , a flow table changing instruction together with flow information so that the communication destination of the malware will become the sinkhole server 200 .
- the open flow controller 300 Based on the flow information received from the setting changing unit 104 , the open flow controller 300 adds an entry to the flow table of the open flow switch 301 so that the communication destination of the packet put on hold in the processing step S 203 will become the sinkhole server 200 . Then, the open flow controller 300 forwards the packet put on hold in the processing step S 203 .
- the sinkhole server 200 that received the forwarded packet returns the response expected by the malware to the malware analysis device 100 based on the content set by the setting changing unit 104 .
- step S 206 the dynamic analysis control unit 103 determines whether a malware analysis exit condition is satisfied.
- the exit condition is, for example, that the operation of the malware is satisfied, that the execution of the malware has passed a certain length of time, or that sufficient analysis results can be obtained.
- the dynamic analysis control unit 103 completes the analysis.
- the procedure returns to step S 202 .
- the malware execution unit 106 executes the malware, and the dynamic analysis control unit 103 continues to perform dynamic analysis.
- the processing step S 202 is executed to resume the malware communication.
- a response expected by the malware can be set appropriately in the sinkhole server 200 .
- the operation of the sinkhole server 200 is dynamically changed. Therefore, the dynamic analysis can be continued appropriately. As a result, the malware analysis can be performed more easily.
- the response expected by the malware is stored in the response storing database 108 , the need to perform static analysis can be reduced when malware similar to the malware once analyzed is analyzed. Thus, the efficiency of malware analysis is improved. Further, since the operation of the malware is not stopped, such dynamic analysis of malware as to detect that the operation is stopped to change the operation content can be performed.
- the response expected by the malware is found by static analysis in the processing step S 204 illustrated in FIG. 2 , and set in the response storing database 108 , but the response expected by the malware may be found by another method.
- control unit 101 when the control unit 101 performs initialization processing, past instances may be registered in the response storing database 108 . Further, the dynamic analysis control unit 103 may generate a response pattern based on the communication protocol or the API used. Further, the dynamic analysis control unit 103 may automatically generate a response pattern, to which character strings and the like extracted as a result of static analysis are added, to use the generated response pattern in order to attempt the analysis.
- malware analysis device 100 in the aforementioned exemplary embodiment can not only be configured in hardware, but also can be implemented by a computer program.
- An information processing system illustrated in FIG. 4 includes a processor 1001 , a program memory 1002 , and a storage medium 1003 for storing data.
- a storage medium 1003 for example, a magnetic storage medium such as a hard disk can be used.
- a magnetic storage medium such as a hard disk
- the program memory 1002 a magnetic storage medium such as a ROM (Read Only Memory), a flash ROM, or a hard disk can be used.
- a program for implementing the functions of the control unit 101 , the static analysis control unit 102 , the dynamic analysis control unit 103 and the setting changing unit 104 in the malware analysis device 100 illustrated in FIG. 1 , and the function of the communication unit 107 except the hardware part to conduct communication are stored in the program memory 1002 .
- the analysis result database 105 and the response storing database 108 are formed on the storage medium 1003 .
- the processor 1001 performs processing according to the program stored in the program memory 1002 to implement the functions of the malware analysis device 100 illustrated in FIG. 2 .
- FIG. 5 is a block diagram illustrating the main part of a malware analysis device.
- a malware analysis device 10 illustrated in FIG. 5 includes a dynamic analysis unit 11 (implemented by the dynamic analysis control unit 102 in the exemplary embodiment) to perform malware dynamic analysis, a communication determination unit 12 (implemented by the dynamic analysis control unit 102 in the exemplary embodiment) to determine whether malware communication occurs when the dynamic analysis unit 11 performs dynamic analysis, a static analysis requesting unit 13 (implemented by the dynamic analysis control unit 102 and the control unit 101 in the exemplary embodiment) to suspend communication when the communication determination unit 12 determines that the communication by the malware occurs to present a request to perform static analysis, and a setting changing unit 14 (implemented by the setting changing unit 104 in the exemplary embodiment) to set a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- a dynamic analysis unit 11 implemented by the dynamic analysis control unit 102 in the exemplary embodiment
- a communication determination unit 12 (implemented by the dynamic
- FIG. 6 is a block diagram illustrating the main part of another aspect of the malware analysis device.
- the malware analysis device 10 illustrated in FIG. 6 further includes a communication resuming unit 15 (implemented by the malware execution unit 106 and the dynamic analysis control unit 102 in the exemplary embodiment. Refer also to the case of No in step S 206 of FIG. 2 ) to resume the malware communication after the device as the communication destination of the malware is set to make the response expected by the malware.
- FIG. 7 is a block diagram illustrating the main part of still another aspect of the malware analysis device.
- the setting changing unit 14 stores, in a response storing database 16 , the response obtained by the static analysis as being expected by the malware.
- FIG. 8 is a block diagram illustrating the main part of a malware analysis system.
- a malware analysis system 50 illustrated in FIG. 8 includes a malware analysis device 10 , and a pseudo response server 20 (implemented by the sinkhole server 200 in the exemplary embodiment) to transmit, to the malware, a pseudo response as a response expected by the malware.
- the malware analysis device 10 has a dynamic analysis unit 11 which performs dynamic analysis of malware, a communication determination unit 12 which determines whether malware communication occurs when the dynamic analysis unit 11 performs the dynamic analysis, a static analysis requesting unit 13 which suspends communication when the communication determination unit 12 determines that the communication by the malware occurs to present a request to perform static analysis, and a setting changing unit 14 which sets a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- FIG. 9 is a block diagram illustrating the main part of another aspect of the malware analysis system.
- the malware analysis device 10 further has a communication resuming unit 15 which resumes the communication by the malware after the pseudo response server is set to make the response expected by the malware.
- FIG. 10 is a block diagram illustrating the main part of still another aspect of the malware analysis system.
- the malware analysis device 10 is configured to perform communication with the pseudo response server 20 through an open flow switch 301 controlled by an open flow controller 300 , and the setting changing unit 14 transmits, to the open flow controller 300 , an instruction to update a flow table of the open flow switch 301 so that the communication destination of the malware will become the pseudo response server 20 .
- a malware analysis program causing a computer to execute: a process of determining whether communication by malware occurs when the malware is dynamically analyzed; a process of suspending communication when the communication by the malware occurs to present a request to perform static analysis; a process of setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware; and a process of resuming the communication by the malware after the device as the communication destination of the malware is set to make the response expected by the malware.
- a non-transitory recording medium storing a malware analysis program, when executed by a computer, performing determining whether communication by malware occurs when the malware is dynamically analyzed, suspending communication when the communication by the malware occurs to present a request to perform static analysis, and setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Stored Programmes (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Other Investigation Or Analysis Of Materials By Electrical Means (AREA)
- Debugging And Monitoring (AREA)
Abstract
A malware analysis device 10 includes: a dynamic analysis unit 11 which performs dynamic analysis of malware; a communication determination unit 12 which determines whether communication by the malware occurs when the dynamic analysis unit 11 performs dynamic analysis; a static analysis requesting unit 13 which suspends communication when the communication determination unit 12 determines that the communication by the malware occurs to present a request to perform static analysis; and a setting changing unit 14 which sets a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
Description
- This application is a Continuation of U.S. application Ser. No. 15/928,294 filed Mar. 22, 2018, which is based upon and claims the benefit of priority from the prior Japanese Patent Application No. 2017-066566, filed Mar. 30, 2017, the entire contents of which are incorporated herein by reference.
- The present invention relates to a malware analysis method, a malware analysis device, and a malware analysis system, capable of analyzing malware easily.
- There are increasing malicious programs (malware), such as computer viruses or spyware, and bots, which bring threats such as information leakage and destruction of data.
- In such a situation, there is a technique for executing malware actually in an environment capable of running the malware safely to observe the behavior of the malware in order to analyze the malware.
- There is malware which infects a computer (e.g., an information terminal such as a personal computer) to connect the infected computer to a C&C (Command & Control) server. The C&C server sends commands to the malware to operate the computer by remote control.
- When such malware is dynamically analyzed, the computer infected with the malware is made communicable with the C&C server. However, when the computer communicates with the C&C server, there is a possibility that the computer will suffer damage. Further, when the C&C server no longer exists, the dynamic analysis cannot be performed.
- Patent Literature 1 discloses a technique for examining what kind of communication malware performs and what impact the malware has on internal resources of a computer.
- An analysis system disclosed in Patent Literature 1 determines a communication protocol when the malware performs communication. Then, a pseudo response (dummy response) from a server predetermined according to the communication protocol is transmitted to the malware. Thus, the malware is dynamically analyzed even in such a situation that actual communication with the C&C server is not performed.
- [Patent Literature 1] Japanese Patent No. 5389855
- However, when the communication protocol cannot be determined, or when the pseudo response from the server response cannot be predefined, the analysis system disclosed in Patent Literature 1 cannot analyze the malware.
- It is an object of the present invention to enable malware to be analyzed more easily.
- A preferred aspect of a malware analysis method includes: determining whether communication by malware occurs when the malware is dynamically analyzed; suspending communication when the communication by the malware occurs to present a request to perform static analysis; and setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- A preferred aspect of a malware analysis device includes: a dynamic analysis unit which performs dynamic analysis of malware; a communication determination unit which determines whether communication by the malware occurs when the dynamic analysis unit performs dynamic analysis; a static analysis requesting unit which suspends communication when the communication determination unit determines that the communication by the malware occurs to present a request to perform static analysis; and a setting changing unit which sets a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- A preferred aspect of a malware analysis system includes a malware analysis device and a pseudo response server which transmits, to malware, a pseudo response as a response expected by the malware, wherein the malware analysis device includes: a dynamic analysis unit which performs dynamic analysis of the malware; a communication determination unit which determines whether communication by the malware occurs when the dynamic analysis unit performs dynamic analysis; a static analysis requesting unit which suspends communication when the communication determination unit determines that the communication by the malware occurs to present a request to perform static analysis; and a setting changing unit which sets the pseudo response server to make a response obtained by the static analysis as being expected by the malware.
- A preferred aspect of a malware analysis program causes a computer to execute: a process of determining whether communication by malware occurs when the malware is dynamically analyzed; a process of suspending communication when the communication by the malware occurs to present a request to perform static analysis; and a process of setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- According to the present invention, malware can be analyzed more easily.
-
FIG. 1 It depicts a block diagram illustrating an exemplary embodiment of a malware analysis system including a malware analysis device. -
FIG. 2 It depicts a flowchart illustrating an operation example of the malware analysis device. -
FIG. 3 It depicts a table for describing an example of information stored in a storing database. -
FIG. 4 It depicts a block diagram illustrating a configuration example of an information processing system in which the functions of a malware analysis device can be implemented. -
FIG. 5 It depicts a block diagram illustrating the main part of a malware analysis device. -
FIG. 6 It depicts a block diagram illustrating the main part of another aspect of the malware analysis device. -
FIG. 7 It depicts a block diagram illustrating the main part of still another aspect of the malware analysis device. -
FIG. 8 It depicts a block diagram illustrating the main part of a malware analysis system. -
FIG. 9 It depicts a block diagram illustrating the main part of another aspect of the malware analysis system. -
FIG. 10 It depicts a block diagram illustrating the main part of still another aspect of the malware analysis system. - An exemplary embodiment of the present invention will be described with reference to the accompanying drawings.
-
FIG. 1 is a block diagram illustrating an exemplary embodiment of a malware analysis system including a malware analysis device. In the example ofFIG. 1 , amalware analysis device 100 in the malware analysis system is connected to asinkhole server 200 through anopen flow switch 301. Thesinkhole server 200 is used in a path for communication performed by malware. - In the following description, “malware performs communication” actually means that resources (a communication interface, and the like, which are typified by a
communication unit 107 inFIG. 1 ) of a device in which the malware exists perform communication according to the malware. - The
malware analysis device 100 is also connected directly to thesinkhole server 200 and theopen flow controller 300. The reason for being directly connected is that themalware analysis device 100 controls thesinkhole server 200 and theopen flow controller 300. - The
open flow controller 300 is to control theopen flow switch 301. - The
malware analysis device 100 includes acontrol unit 101, a staticanalysis control unit 102, a dynamicanalysis control unit 103, asetting changing unit 104, an analysis result database (DB) 105, amalware execution unit 106, acommunication unit 107, and a response storing database (DB) 108. - The
control unit 101 controls each of the functions of themalware analysis device 100. The staticanalysis control unit 102 performs control for static analysis of malware. The dynamicanalysis control unit 103 performs control of dynamic analysis of malware. Thesetting changing unit 104 changes the settings of thesinkhole server 200 and theopen flow controller 300. - The
analysis result database 105 stores the analysis results of malware. Themalware execution unit 106 executes malware to analyze the malware. Thecommunication unit 107 performs communication with thesinkhole server 200, theopen flow controller 300, and theopen flow switch 301. Theresponse storing database 108 stores a response expected by malware when the malware performs communication, and a setting method therefor. - When taking, as an example, a case where the name resolution of a C&C server is performed, the response expected by malware is an IP address of the C&C server, a web access response to check the Internet connection, a command from the C&C server to run the malware, or the like.
- The
sinkhole server 200 includes aresponse generation unit 201 which returns an expected response when the malware performs communication, and acommunication unit 202 which performs communication. In this specification, thesinkhole server 200 is set as a server configured to absorb the traffic of malware in order to analyze the malware. Thesinkhole server 200 supplies, to malware, a response expected by the malware (a pseudo response in fact) on behalf of the C&C server, for example. - Next, operation of the
malware analysis device 100 will be described.FIG. 2 is a flowchart illustrating an operation example of themalware analysis device 100. - In the
malware analysis device 100, initialization processing is first performed (step S201). - Specifically, in the initialization processing, the
control unit 101 instructs themalware execution unit 106 to prepare an environment appropriate for the malware to be analyzed through the dynamicanalysis control unit 103. In preparation for executing the malware, themalware execution unit 106 configures the settings of a CPU (Central Processing Unit), a memory and a disk, an OS (Operating System) and an application, and the like, required to run the malware to be analyzed. - Further, the
control unit 101 sends the setting changingunit 104 an initialization instruction. Thesetting changing unit 104 that received the initialization instruction instructs, through thecommunication unit 107, thesinkhole server 200 and theopen flow controller 300 to perform initialization. Thesinkhole server 200 performs initialization processing in response to the instruction such as to clear the response generation. Theopen flow controller 300 performs processing to clear a flow table of theopen flow switch 301 in response to the instruction. - Next, in step S202, the
malware execution unit 106 executes the malware. The dynamicanalysis control unit 103 monitors the execution status of the malware. Then, the dynamicanalysis control unit 103 stores, in theanalysis result database 105, information such as access of the malware to a file, process execution, API (Application Programming Interface) calling, communication destination, and the like. - In step S203, the dynamic
analysis control unit 103 determines whether the malware performs communication. When it is determined that communication is performed, the procedure proceeds to step S204. When it is determined that communication is not performed, the procedure moves to step S206. For example, the dynamicanalysis control unit 103 can check whether thecommunication unit 107 operates to determine whether the malware performs communication. - When the malware performs communication, the
malware execution unit 106 transmits a packet to theopen flow switch 301 through thecommunication unit 107. Since there is no entry of information related to the packet in the flow table, theopen flow switch 301 forwards the packet to theopen flow controller 300 to make an inquiry about the packet. Theopen flow controller 300 that received the packet holds the received packet intact when the processing step S203 is executed. - When the malware performs communication, a malware analyst makes a static analysis of the malware in step S204 to set a response expected by the malware. At this time, the
malware execution unit 106 suspends the processing according to an instruction, for example, from the dynamicanalysis control unit 103. Thus, the communication from the malware is suspended temporarily. - In order that the malware analyst creates an opportunity to make a static analysis of the malware, it is considered that the
malware analysis device 100 performs the following processing as an example. - In other words, the dynamic
analysis control unit 103 provides a display on a display unit (unillustrated inFIG. 1 ) of themalware analysis device 100 or a display device connected to themalware analysis device 100 through thecontrol unit 101 to indicate that the malware does not perform communication, or a display to recommend that the static analysis should be made. - When making the static analysis, the malware analyst requests the dynamic analysis results stored in the
analysis result database 105, the register of themalware execution unit 106, the state of the memory, assembly code of the malware, and the like from thecontrol unit 101 through an input unit (unillustrated inFIG. 1 ) in themalware analysis device 100 or an input device connected to themalware analysis device 100. Thecontrol unit 101 transfers the input request to the staticanalysis control unit 102 and themalware execution unit 106. - Information as the answer to the request is output, for example, from the static
analysis control unit 102 and themalware execution unit 106 to the display unit or the display device through thecontrol unit 101. Based on the information as the answer, the malware analyst finds a response expected by the malware. The found response expected by the malware is input, for example, from the input unit or the input device to thecontrol unit 101 or thesetting changing unit 104. When themalware analysis device 100 is so configured that the response expected by the malware will be input to thecontrol unit 101, thecontrol unit 101 stores the response expected by the malware in theresponse storing database 108 through thesetting changing unit 104. When themalware analysis device 100 is so configured that the response expected by the malware is input to thesetting changing unit 104, thesetting changing unit 104 stores the response expected by malware in theresponse storing database 108. -
FIG. 3 is a table for describing an example of information stored in theresponse storing database 108. - In the example illustrated in
FIG. 3 , flow information to be applied to theopen flow switch 301 to transfer communication to thesinkhole server 200, an expected response, and a setting method required to return the response to thesinkhole server 200 are stored for each combination of a specific API and an argument in theresponse storing database 108. The setting method includes a program or a script, a setting file, and the like. - In the exemplary embodiment, the API and the argument are set in the
response storing database 108, but a different condition may also be set. For example, assembly code may be set instead of the API. Further, an object state, or the state of the register or the memory may be set instead of the argument. Further, the address of an instruction during execution of the malware may be set. - In step S205, the
control unit 101 instructs thesetting changing unit 104 to configure the settings for thesinkhole server 200 and theopen flow controller 300 based on the information stored in theresponse storing database 108. Thesetting changing unit 104 executes the settings for theresponse generation unit 201 of thesinkhole server 200 through thecommunication unit 107 according to the expected response and the setting method stored in theresponse storing database 108. In other words, thesetting changing unit 104 sets theresponse generation unit 201 so that thesinkhole server 200 will return the response expected by the malware. - Further, when it is detected in the processing step S203 that the malware performs communication, the
setting changing unit 104 transmits, to theopen flow controller 300, a flow table changing instruction together with flow information so that the communication destination of the malware will become thesinkhole server 200. - Based on the flow information received from the
setting changing unit 104, theopen flow controller 300 adds an entry to the flow table of theopen flow switch 301 so that the communication destination of the packet put on hold in the processing step S203 will become thesinkhole server 200. Then, theopen flow controller 300 forwards the packet put on hold in the processing step S203. Thesinkhole server 200 that received the forwarded packet returns the response expected by the malware to themalware analysis device 100 based on the content set by thesetting changing unit 104. - In step S206, the dynamic
analysis control unit 103 determines whether a malware analysis exit condition is satisfied. The exit condition is, for example, that the operation of the malware is satisfied, that the execution of the malware has passed a certain length of time, or that sufficient analysis results can be obtained. When determining that the exit condition is satisfied, the dynamicanalysis control unit 103 completes the analysis. - When the exit condition is not satisfied, the procedure returns to step S202. In other words, the
malware execution unit 106 executes the malware, and the dynamicanalysis control unit 103 continues to perform dynamic analysis. When malware communication is interrupted, the processing step S202 is executed to resume the malware communication. - As described above, in the exemplary embodiment, since static analysis is performed when the malware performs communication during malware dynamic analysis, a response expected by the malware can be set appropriately in the
sinkhole server 200. In other words, the operation of thesinkhole server 200 is dynamically changed. Therefore, the dynamic analysis can be continued appropriately. As a result, the malware analysis can be performed more easily. - Further, since the response expected by the malware is stored in the
response storing database 108, the need to perform static analysis can be reduced when malware similar to the malware once analyzed is analyzed. Thus, the efficiency of malware analysis is improved. Further, since the operation of the malware is not stopped, such dynamic analysis of malware as to detect that the operation is stopped to change the operation content can be performed. - In the aforementioned exemplary embodiment, the response expected by the malware is found by static analysis in the processing step S204 illustrated in
FIG. 2 , and set in theresponse storing database 108, but the response expected by the malware may be found by another method. - For example, when the
control unit 101 performs initialization processing, past instances may be registered in theresponse storing database 108. Further, the dynamicanalysis control unit 103 may generate a response pattern based on the communication protocol or the API used. Further, the dynamicanalysis control unit 103 may automatically generate a response pattern, to which character strings and the like extracted as a result of static analysis are added, to use the generated response pattern in order to attempt the analysis. - Note that the
malware analysis device 100 in the aforementioned exemplary embodiment can not only be configured in hardware, but also can be implemented by a computer program. - An information processing system illustrated in
FIG. 4 includes aprocessor 1001, aprogram memory 1002, and astorage medium 1003 for storing data. As thestorage medium 1003, for example, a magnetic storage medium such as a hard disk can be used. As theprogram memory 1002, a magnetic storage medium such as a ROM (Read Only Memory), a flash ROM, or a hard disk can be used. - In the information processing system illustrated in
FIG. 4 , a program for implementing the functions of thecontrol unit 101, the staticanalysis control unit 102, the dynamicanalysis control unit 103 and thesetting changing unit 104 in themalware analysis device 100 illustrated inFIG. 1 , and the function of thecommunication unit 107 except the hardware part to conduct communication are stored in theprogram memory 1002. Theanalysis result database 105 and theresponse storing database 108 are formed on thestorage medium 1003. Then, theprocessor 1001 performs processing according to the program stored in theprogram memory 1002 to implement the functions of themalware analysis device 100 illustrated inFIG. 2 . -
FIG. 5 is a block diagram illustrating the main part of a malware analysis device. Amalware analysis device 10 illustrated inFIG. 5 includes a dynamic analysis unit 11 (implemented by the dynamicanalysis control unit 102 in the exemplary embodiment) to perform malware dynamic analysis, a communication determination unit 12 (implemented by the dynamicanalysis control unit 102 in the exemplary embodiment) to determine whether malware communication occurs when thedynamic analysis unit 11 performs dynamic analysis, a static analysis requesting unit 13 (implemented by the dynamicanalysis control unit 102 and thecontrol unit 101 in the exemplary embodiment) to suspend communication when thecommunication determination unit 12 determines that the communication by the malware occurs to present a request to perform static analysis, and a setting changing unit 14 (implemented by thesetting changing unit 104 in the exemplary embodiment) to set a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware. -
FIG. 6 is a block diagram illustrating the main part of another aspect of the malware analysis device. Themalware analysis device 10 illustrated inFIG. 6 further includes a communication resuming unit 15 (implemented by themalware execution unit 106 and the dynamicanalysis control unit 102 in the exemplary embodiment. Refer also to the case of No in step S206 ofFIG. 2 ) to resume the malware communication after the device as the communication destination of the malware is set to make the response expected by the malware. -
FIG. 7 is a block diagram illustrating the main part of still another aspect of the malware analysis device. In themalware analysis device 10 illustrated inFIG. 7 , thesetting changing unit 14 stores, in aresponse storing database 16, the response obtained by the static analysis as being expected by the malware. -
FIG. 8 is a block diagram illustrating the main part of a malware analysis system. Amalware analysis system 50 illustrated inFIG. 8 includes amalware analysis device 10, and a pseudo response server 20 (implemented by thesinkhole server 200 in the exemplary embodiment) to transmit, to the malware, a pseudo response as a response expected by the malware. Themalware analysis device 10 has adynamic analysis unit 11 which performs dynamic analysis of malware, acommunication determination unit 12 which determines whether malware communication occurs when thedynamic analysis unit 11 performs the dynamic analysis, a staticanalysis requesting unit 13 which suspends communication when thecommunication determination unit 12 determines that the communication by the malware occurs to present a request to perform static analysis, and asetting changing unit 14 which sets a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware. -
FIG. 9 is a block diagram illustrating the main part of another aspect of the malware analysis system. In themalware analysis system 50 illustrated inFIG. 9 , themalware analysis device 10 further has acommunication resuming unit 15 which resumes the communication by the malware after the pseudo response server is set to make the response expected by the malware. -
FIG. 10 is a block diagram illustrating the main part of still another aspect of the malware analysis system. In themalware analysis system 50 illustrated inFIG. 10 , themalware analysis device 10 is configured to perform communication with thepseudo response server 20 through anopen flow switch 301 controlled by anopen flow controller 300, and thesetting changing unit 14 transmits, to theopen flow controller 300, an instruction to update a flow table of theopen flow switch 301 so that the communication destination of the malware will become thepseudo response server 20. - While the above exemplary embodiment can be described partially or wholly as the following supplementary notes, the configuration of the present invention is not limited to any of the following configurations.
- (Supplementary note 1) A malware analysis program causing a computer to execute: a process of determining whether communication by malware occurs when the malware is dynamically analyzed; a process of suspending communication when the communication by the malware occurs to present a request to perform static analysis; a process of setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware; and a process of resuming the communication by the malware after the device as the communication destination of the malware is set to make the response expected by the malware.
- (Supplementary note 2) The malware analysis program according to Supplementary note 1, causing the computer to further execute a process of storing, in a response storing database, the response obtained by the static analysis as being expected by malware.
- (Supplementary note 3) A non-transitory recording medium storing a malware analysis program, when executed by a computer, performing determining whether communication by malware occurs when the malware is dynamically analyzed, suspending communication when the communication by the malware occurs to present a request to perform static analysis, and setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
- (Supplementary note 4) The recording medium according to Supplementary note 3, when executed by a computer, the malware analysis program performing resuming the communication by the malware after the device as the communication destination of the malware is set to make the response expected by the malware.
- (Supplementary note 5) The recording medium according to Supplementary note 3 or 4, when executed by a computer, the malware analysis program performing storing the response obtained by the static analysis as being expected by the malware in a response storing database.
Claims (12)
1. A malware analysis method for performing dynamic analysis of malware, comprising:
determining whether communication by the malware occurs when the malware is dynamically analyzed;
suspending communication when the communication by the malware occurs to present a request to perform static analysis; and
setting a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
2. The malware analysis method according to claim 1 , further comprising:
resuming the communication by the malware after setting the device as the communication destination of the malware to make the response expected by the malware.
3. The malware analysis method according to claim 1 , further comprising:
storing the response obtained by the static analysis as being expected by the malware in a response storing database.
4. The malware analysis method according to claim 2 , further comprising:
storing the response obtained by the static analysis as being expected by the malware in a response storing database.
5. A malware analysis device comprising:
a dynamic analysis unit which performs dynamic analysis of malware;
a communication determination unit which determines whether communication by the malware occurs when the dynamic analysis unit performs dynamic analysis;
a static analysis requesting unit which suspends communication when the communication determination unit determines that the communication by the malware occurs to present a request to perform static analysis; and
a setting changing unit which sets a device as a communication destination of the malware to make a response obtained by the static analysis as being expected by the malware.
6. The malware analysis device according to claim 5 , further comprising a communication resuming unit which resumes the communication by the malware after the device as the communication destination of the malware is set to make the response expected by the malware.
7. The malware analysis device according to claim 5 , wherein the setting changing unit stores, in a response storing database, the response obtained by the static analysis as being expected by the malware.
8. The malware analysis device according to claim 6 , wherein the setting changing unit stores, in a response storing database, the response obtained by the static analysis as being expected by the malware.
9. A malware analysis system including a malware analysis device and a pseudo response server which transmits, to malware, a pseudo response as a response expected by the malware, wherein
the malware analysis device comprises:
a dynamic analysis unit which performs dynamic analysis of the malware;
a communication determination unit which determines whether communication by the malware occurs when the dynamic analysis unit performs dynamic analysis;
a static analysis requesting unit which suspends communication when the communication determination unit determines that the communication by the malware occurs to present a request to perform static analysis; and
a setting changing unit which sets the pseudo response server to make a response obtained by the static analysis as being expected by the malware.
10. The malware analysis system according to claim 9 , wherein the malware analysis device further comprises a communication resuming unit which resumes the communication by the malware after the pseudo response server is set to make the response expected by the malware.
11. The malware analysis system according to claim 9 ,
wherein the malware analysis device is configured to communicate with the pseudo response server through an open flow switch controlled by an open flow controller, and
wherein the setting changing unit transmits, to the open flow controller, an instruction to update a flow table of the open flow switch so that a communication destination of the malware will become the pseudo response server.
12. The malware analysis system according to claim 10 ,
wherein the malware analysis device is configured to communicate with the pseudo response server through an open flow switch controlled by an open flow controller, and
wherein the setting changing unit transmits, to the open flow controller, an instruction to update a flow table of the open flow switch so that a communication destination of the malware will become the pseudo response server.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/396,894 US20220030016A1 (en) | 2017-03-30 | 2021-08-09 | Malware analysis method, malware analysis device, and malware analysis system |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2017066566A JP6834688B2 (en) | 2017-03-30 | 2017-03-30 | Malware analysis method, malware analysis device and malware analysis system |
| JP2017-066566 | 2017-03-30 | ||
| US15/928,294 US11134089B2 (en) | 2017-03-30 | 2018-03-22 | Malware analysis method, malware analysis device, and malware analysis system |
| US17/396,894 US20220030016A1 (en) | 2017-03-30 | 2021-08-09 | Malware analysis method, malware analysis device, and malware analysis system |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/928,294 Continuation US11134089B2 (en) | 2017-03-30 | 2018-03-22 | Malware analysis method, malware analysis device, and malware analysis system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20220030016A1 true US20220030016A1 (en) | 2022-01-27 |
Family
ID=63670028
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/928,294 Active 2039-07-25 US11134089B2 (en) | 2017-03-30 | 2018-03-22 | Malware analysis method, malware analysis device, and malware analysis system |
| US17/396,894 Abandoned US20220030016A1 (en) | 2017-03-30 | 2021-08-09 | Malware analysis method, malware analysis device, and malware analysis system |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/928,294 Active 2039-07-25 US11134089B2 (en) | 2017-03-30 | 2018-03-22 | Malware analysis method, malware analysis device, and malware analysis system |
Country Status (4)
| Country | Link |
|---|---|
| US (2) | US11134089B2 (en) |
| JP (1) | JP6834688B2 (en) |
| SG (1) | SG10201802586VA (en) |
| TW (1) | TW201842462A (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10685116B2 (en) * | 2018-02-23 | 2020-06-16 | Mcafee, Llc | Anti-ransomware systems and methods using a sinkhole at an electronic device |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090327637A1 (en) * | 2008-06-25 | 2009-12-31 | Chouery Farid A | Security system for computers |
| US20110167494A1 (en) * | 2009-12-31 | 2011-07-07 | Bowen Brian M | Methods, systems, and media for detecting covert malware |
| US20160080414A1 (en) * | 2014-09-12 | 2016-03-17 | Topspin Security Ltd. | System and a Method for Identifying Malware Network Activity Using a Decoy Environment |
| US20170006061A1 (en) * | 2015-07-02 | 2017-01-05 | Reliaquest Holdings, Llc | Threat intelligence system and method |
| US20170302683A1 (en) * | 2014-09-17 | 2017-10-19 | Mitsubishi Electric Corporation | Attack observation apparatus and attack observation method |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP5389855B2 (en) | 2011-04-28 | 2014-01-15 | 日本電信電話株式会社 | Analysis system, analysis method and analysis program |
| JP5839967B2 (en) * | 2011-12-01 | 2016-01-06 | 三菱電機株式会社 | Malware analysis system |
| US8826431B2 (en) * | 2012-11-20 | 2014-09-02 | Symantec Corporation | Using telemetry to reduce malware definition package size |
| US9241010B1 (en) | 2014-03-20 | 2016-01-19 | Fireeye, Inc. | System and method for network behavior detection |
| US10248790B2 (en) | 2014-06-17 | 2019-04-02 | Nippon Telegraph And Telephone Corporation | Information processing system, controlling method, and controlling computer program |
| US10536261B2 (en) | 2014-09-25 | 2020-01-14 | Nec Corporation | Analysis system, analysis method, and storage medium |
| US10044675B1 (en) * | 2014-09-30 | 2018-08-07 | Palo Alto Networks, Inc. | Integrating a honey network with a target network to counter IP and peer-checking evasion techniques |
| US20200067861A1 (en) * | 2014-12-09 | 2020-02-27 | ZapFraud, Inc. | Scam evaluation system |
| US9667440B2 (en) * | 2015-02-10 | 2017-05-30 | Alcatel Lucent | Method and system for identifying an incoming interface using openflow protocol |
| US20170359376A1 (en) * | 2016-06-14 | 2017-12-14 | Cymmetria, Inc. | Automated threat validation for improved incident response |
| US10289844B2 (en) * | 2017-01-19 | 2019-05-14 | International Business Machines Corporation | Protecting backup files from malware |
-
2017
- 2017-03-30 JP JP2017066566A patent/JP6834688B2/en active Active
-
2018
- 2018-03-09 TW TW107107972A patent/TW201842462A/en unknown
- 2018-03-22 US US15/928,294 patent/US11134089B2/en active Active
- 2018-03-28 SG SG10201802586VA patent/SG10201802586VA/en unknown
-
2021
- 2021-08-09 US US17/396,894 patent/US20220030016A1/en not_active Abandoned
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090327637A1 (en) * | 2008-06-25 | 2009-12-31 | Chouery Farid A | Security system for computers |
| US20110167494A1 (en) * | 2009-12-31 | 2011-07-07 | Bowen Brian M | Methods, systems, and media for detecting covert malware |
| US20160080414A1 (en) * | 2014-09-12 | 2016-03-17 | Topspin Security Ltd. | System and a Method for Identifying Malware Network Activity Using a Decoy Environment |
| US20170302683A1 (en) * | 2014-09-17 | 2017-10-19 | Mitsubishi Electric Corporation | Attack observation apparatus and attack observation method |
| US20170006061A1 (en) * | 2015-07-02 | 2017-01-05 | Reliaquest Holdings, Llc | Threat intelligence system and method |
Also Published As
| Publication number | Publication date |
|---|---|
| US11134089B2 (en) | 2021-09-28 |
| JP2018169792A (en) | 2018-11-01 |
| TW201842462A (en) | 2018-12-01 |
| US20180288076A1 (en) | 2018-10-04 |
| SG10201802586VA (en) | 2018-10-30 |
| JP6834688B2 (en) | 2021-02-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10599841B2 (en) | System and method for reverse command shell detection | |
| KR102386560B1 (en) | Hardware-based virtualized security isolation technique | |
| US8370932B2 (en) | Method and apparatus for detecting malware in network traffic | |
| US9407648B1 (en) | System and method for detecting malicious code in random access memory | |
| CN102902919B (en) | A kind of identifying processing methods, devices and systems of suspicious operation | |
| US8539582B1 (en) | Malware containment and security analysis on connection | |
| US10341365B1 (en) | Methods and system for hiding transition events for malware detection | |
| US8079030B1 (en) | Detecting stealth network communications | |
| EP3091466B1 (en) | Identification device, identification method, and identification program | |
| US10635816B2 (en) | Restricting reprogramming of a redirected USB device | |
| JP2025504794A (en) | An instrumentation engine for web applications to detect injected code | |
| JP2018081514A (en) | Malware analysis method and storage medium | |
| US20220030016A1 (en) | Malware analysis method, malware analysis device, and malware analysis system | |
| CN102446253A (en) | Webpage Trojan horse detection method and system | |
| JP2016181208A (en) | Fraud monitoring device and fraud monitoring program | |
| JP7099566B2 (en) | Malware analysis method, malware analysis device and malware analysis system | |
| Araujo et al. | Embedded honeypotting | |
| WO2020255185A1 (en) | Attack graph processing device, method, and program | |
| KR102156600B1 (en) | System and method for creating association between packets collected in network and processes in endpoint computing device | |
| US10104099B2 (en) | System and method for monitoring a computer system using machine interpretable code | |
| KR101482886B1 (en) | Apparatus and method of data loss prevention using file tagging | |
| KR20030091889A (en) | System for preventing spread of virus and method thereof | |
| JP6498413B2 (en) | Information processing system, information processing apparatus, control server, generation server, operation control method, and operation control program | |
| KR20240074402A (en) | Method and server for analyzing weak point of mobile application based on web browser cloud | |
| US10846396B1 (en) | Downloading data in a dedicated virtual machine |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |