BotSwindler: tamper resistant injection of believable decoys in VM-based hosts for crimeware detection

  • Authors:
  • Brian M. Bowen;Pratap Prabhu;Vasileios P. Kemerlis;Stelios Sidiroglou;Angelos D. Keromytis;Salvatore J. Stolfo

  • Affiliations:
  • Department of Computer Science, Columbia University;Department of Computer Science, Columbia University;Department of Computer Science, Columbia University;Computer Science and Artificial Intelligence Laboratory, MIT;Department of Computer Science, Columbia University;Department of Computer Science, Columbia University

  • Venue:
  • RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementation of BotSwindler relies upon an out-of-host software agent that drives user-like interactions in a virtual machine, seeking to convince malware residing within the guest OS that it has captured legitimate credentials. To aid in the accuracy and realism of the simulations, we propose a low overhead approach, called virtual machine verification, for verifying whether the guest OS is in one of a predefined set of states.We present results from experiments with real credential-collecting malware that demonstrate the injection of monitored financial bait for detecting compromises. Additionally, using a computational analysis and a user study, we illustrate the believability of the simulations and we demonstrate that they are sufficiently human-like. Finally, we provide results from performance measurements to show our approach does not impose a performance burden.