Journal of Information Processing
Online ISSN : 1882-6652
ISSN-L : 1882-6652
Detection of Malicious Tools by Monitoring DLL Using Deep Learning
Wataru MatsudaMariko FujimotoTakuho Mitsunaga
著者情報
ジャーナル フリー

2020 年 28 巻 p. 1052-1064

詳細
抄録

In targeted attacks, various malicious tools are leveraged by attackers. According to the Cybersecurity and Infrastructure Security Agency (CISA), tools such as China Chopper, Mimikatz, PowerShell Empire, and HUC Packet Transmitter are used in targeted attacks. Standard malware detection methods include those based on file names or hashes. However, attackers tend to avoid detection by changing the file name of malicious tools or by rebuilding them. Therefore, detecting malicious tools used in targeted attacks is difficult. We found that the order of Windows built-in DLLs loaded by each malicious tool has unique characteristics. In this study, we propose a detection method of malicious tools by analyzing DLL information using deep learning, considering the DLL and its order of loading by each process. We confirmed that even if the file names are changed or tools are rebuilt, our proposed method could detect the mentioned four tools with high detection rates: with a recall rate of 97.45%, a precision rate of 97.29%, and F value of 97.37% on average. Furthermore, the proposed method can detect malicious tools with more than a 90% detection rate, even if about 10% of loaded DLLs are changed in the future.

著者関連情報
© 2020 by the Information Processing Society of Japan
前の記事 次の記事
feedback
Top