ROBUST SCAREWARE IMAGE DETECTION Christian Seifert, Jack

ROBUST SCAREWARE IMAGE DETECTION Christian Seifert, Jack

ROBUST SCAREWARE IMAGE DETECTION Christian Seifert, Jack W. Stokes Long Lu Christina Colcernian, John C. Platt Georgia Institute of Technology Microsoft Corp. Atlanta, GA 30332 Redmond, WA 98052 ABSTRACT In this paper, we propose an image-based detection method to identify web-based scareware attacks that is robust to eva- sion techniques. We evaluate the method on a large-scale data set that resulted in an equal error rate of 0.018%. Conceptu- ally, false positives may occur when a visual element, such as a red shield, is embedded in a benign page. We suggest in- cluding additional orthogonal features or employing graders to mitigate this risk. A novel visualization technique is pre- sented demonstrating the acquired classifier knowledge on a classified screenshot. Index Terms— security, scareware, social engineering Fig. 1. Scareware Screenshot 1. INTRODUCTION Important contributions in this work include: I. a robust, language-independent image recognition algorithm that de- Botnets with thousands of bots are controlled by cyber crim- tects the scareware social engineering attack. II. a classifi- inals today. These bots primarily reside on the average desk- cation system that learns potential image obfuscation tech- top computer at home, at one’s work place, or in Internet niques. III. a large-scale implementation that illustrates the Cafes. Client-side attacks are used by these criminals to in- proposed methods are indeed effective. IV. a visualization fect one’s machine and join it to the botnet. In the first half of technique for displaying the acquired classifier knowledge is 2011, several primary client-side attack vectors exist: drive- presented. by-download attacks, AutoRun attacks, and social engineer- ing attacks [1]. Web-based social engineering attacks present false information to the user and trick her into download- 2. BACKGROUND ing and executing malware herself. As Internet threats are heavily touted in the community and media, attackers have Scareware: Many computer users have been affected by a adopted a social engineering angle in this space to accomplish scareware attack where the operating system or an antivirus their goal: scareware. Scareware attacks typically attempt to (AV) program apparently runs a scan on their computer and trick computer users into believing their computer has been appears to detect multiple instances of malware. In reality, the infected and offering them a solution by purchasing a fake user’s browser renders a web site displays an animation pro- anti-virus product that allegedly removes the malware from viding the illusion of the AV scan as shown in Figure 1. These their computer. There are numerous challenges in detecting animations visually try to match the look and feel of the un- scareware attacks: obfuscation and a wide array of technol- derlying operating system with the goal of selling the fake ogy that can be used to implement such an attack. product to the user and infect the user’s machine [2]. Note In this paper, we present a new, robust detection technol- that the visualization is entirely implemented using browser ogy that aims to identify the scareware social engineering at- rendering techniques (e.g. HTML, Flash, JavaScript). tack at a layer that the attacker cannot arbitrarily obfuscate: Detection Countermeasures: Operators of scareware at- the visual images presented to the end user. The system is tacks want to distribute malware and make money. As a re- designed to be robust to evasion tactics and also independent sult, they have a vested interest to remain undetected and be of the language and underlying technology used to implement resilient against interruption of “service”. First, the attacker the attack. can influence where the content responsible for the scareware animation as well as the actual malware is hosted. These – so descriptors through their Euclidian distance. Each descriptor M called scareware servers – could be running on compromised dij 2 R is a histogram of gradients surrounding the region servers or on servers with hosting providers that don’t respond of the interest point j in screenshot si while M is the dimen- to abuse reports. Often, the infrastructure is only utilized for sion of the descriptor. In Table 1, we denote di• to be the a short duration of time [3] making it hard to detect and main- set of all descriptors for si, and we use M = 32 which is tain a comprehensive list of scareware servers. Second, at- the default setting for the Daisy algorithm. While the Daisy tackers can change the content itself through polymorphism algorithm reliably identifies the interest points, small varia- and content obfuscation. This technique thwarts widely de- tions from screenshot to screenshot may result in similar de- ployed signature-based approaches to detect scareware. scriptors. In order to identify descriptors which are common As the user is presented with a scareware animation, among the various scareware attack images, we learn clusters image-based detection techniques may be used to identify of descriptors which are important in scareware attacks. Us- the scareware attack. However, it appears that scareware au- ing screenshots from the scareware attacks, we use a variation thors are aware of such techniques and are taking measures of the simple IsoData clustering algorithm [5, 6] to learn the to thwart such detection to a certain extent as well. They may clusters C. The cluster medoid, c^j, is next determined to be slightly modify individual images that are used to construct the descriptor closest to the mean of all descriptors contained the animation. For instance, they may change one pixel on in the cluster. Once the cluster center descriptor has been de- C the disk drive icon or split the image into multiples blocks. termined, the maximum cluster distance, Tj , from this clus- Visual elements may be rearranged or an attacker could use ter medoid to all descriptors contained within the cluster is different icons altogether. However, the attacker needs to computed. After all clusters have been determined, a labeled walk a fine line between presenting a user with an animation dataset containing a row for each labeled image (scareware, that resembles the operating system and taking measures to benign) is created. Formally, consider the hypothesis space evade image-based detection. If the attacker uses different X × Y , where X 2 Rd, Y 2 {−1; 1g. Here d is the dimen- icons altogether, the deception that the operating system or le- sion of the feature vector consisting of the number of selected d gitimate AV software scans the system for threats may break cluster features. For each observation pair hxi; yii, xi 2 R , down. The result could be a decrease of conversion rates and yi 2 {−1; 1g for i = 1::jDj. The features for the classifier subsequently a smaller return of investment for the attacker. consist of a histogram where each bin represents the number Image-Based Detection: As mentioned in the previous of descriptors that were assigned to the constructed clusters. section, image-based detection may be one way to identify A descriptor is assigned to cluster j when its Euclidian dis- scareware. Several approaches can be adopted including ex- tance from the center cluster descriptor is less than or equal to C act match, near match, or similar match. In the exact match the clusters maximum distance, Tj . The main three steps are image matching method, one may apply a cryptographic hash explained in detail in this section and the algorithm is sum- (e.g. Sha256) of visual components. This is a rather frag- marized in Table 1. ile. Near image matching addresses the short coming of exact With the feature vector at hand, several different classi- matches. In this case, visual descriptors, e.g. Daisy descrip- fiers are trained including logistic regression with stochastic tors [4], are used to match images. Even slight modifications gradient descent (SGD) optimization and early stopping [7], to the image may result in a match. However, a reordering or logistic regression with L-BFGS optimization and L1 and L2 changing of visual elements may result in a mismatch and, as regularization [8], boosted decision trees using MART [9], scareware tends to change the layout of their animation, near and the averaged perceptron [10]. image matching would not be suitable to detect scareware at- Prediction: The prediction of unknown screenshots has tacks. We next describe a similar match algorithm to address similar steps taken during the training phase. First the de- this limitation. scriptors need to be extracted from the unknown screenshots. Its descriptors are assigned to the constructed clusters as de- 3. SCAREWARE IMAGE CLASSIFICATION scribed previously. From that assignment, a feature vector is constructed that can be fed into the classifier to generate a In this section, we describe the proposed scareware image score. A score larger than a predefined threshold indicates a classification system which operates on screenshots (e.g. .jpg) scareware page has been identified by the classifier whereas a of web pages. The goals of the classifier are to capture the lower score would indicate the opposite. common visual elements of scareware attacks and to identify The weights from linear classifiers (e.g. logistic regres- screenshots of web pages containing similar elements. sion) have the capability to identify important clusters in de- Classifier Training: The classifier is trained from a set of termining whether a screenshot shows scareware. A visual web page screenshots, S. Scareware attack images are in- representation of the acquired classifier knowledge can there- cluded in SA ⊂ S. To describe an individual screenshot si, a fore be created. A scareware example is shown in Figure 2. set of interest point descriptors D are extracted by the Daisy Descriptors assigned to a cluster that bares a scareware weight detector algorithm [4].

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us