tBox: A System to Protect a "Bad" User from Targeted and User-Oriented Attacks

被引:0
|
作者
Tokhtabayev, Amur G. [1 ]
Aimyshev, Batyrulan [1 ]
Seitkulov, Yerzhan [2 ]
机构
[1] T&T Secur, Astana, Kazakhstan
[2] LN Gumilyov Eurasian Natl Univ, Astana, Kazakhstan
关键词
Threat isolation; Zero-day malware; Attacks on a User; Distributed malware; Targeted attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce tBox system that enables protection from targeted and user-oriented attacks. Such attacks relay on users mistakes such as misinterpreting or ignoring security alerts, which leads to proliferation of malicious objects inside trusted perimeter of cyber-security systems (e.g. exclusion list of AV). These attacks include strategic web compromise, spear phishing, insider threat and social network malware. Moreover, targeted attacks often deliver zero-day malware that is made difficult to be detected, e.g. due to distributed malicious payload. The tBox system allows for protecting even a "bad" user who does not cooperate with security products. To accomplish this, tBox seamlessly transfers user activity with vulnerable applications into specific virtual environment that provides three key factors: user activity isolation, behavior self-monitoring and security inheritance for user-carried objects. To provide self monitoring, our team developed a novel technology for deep dynamic analysis of system-wide behavior, which allows for run-time recognition of malicious functionalities including obfuscated and distributed ones. We evaluate the tBox prototype with corpus of real malware families. Results show high efficiency of tBox in detecting and blocking malware while haying low system overhead.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [21] User-oriented production support
    Benz, S
    Schulten, M
    IECON '98 - PROCEEDINGS OF THE 24TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-4, 1998, : 1946 - 1949
  • [22] User-Oriented Requirements Engineering
    Sutcliffe, Alistair
    2014 IEEE 2ND INTERNATIONAL WORKSHOP ON USABILITY AND ACCESSIBILITY FOCUSED REQUIREMENTS ENGINEERING (USARE), 2014, : 1 - 8
  • [23] USER-ORIENTED INFORMATION SYSTEMS
    SWANSON, RW
    AMERICAN DOCUMENTATION, 1969, 20 (03): : 279 - 280
  • [24] Towards User-Oriented Steganography
    Ogiela, Urszula
    Ogiela, Marek R.
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024, 2024, 202 : 159 - 165
  • [25] The place of user enhanceability in user-oriented software development
    University of Hull, United Kingdom
    Journal of End User Computing, 1998, 10 (02): : 4 - 14
  • [26] A TAXONOMY OF USER-ORIENTED FUNCTIONS
    CARTER, JA
    INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1986, 24 (03): : 195 - 292
  • [27] Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model
    Hamoud, Aymen
    Aimeur, Esma
    FRONTIERS IN COMPUTER SCIENCE, 2020, 2
  • [28] Nonlinear System Identification A USER-ORIENTED ROAD MAP
    Schoukens, Johan
    Ljung, Lennart
    IEEE CONTROL SYSTEMS MAGAZINE, 2019, 39 (06): : 28 - 99
  • [30] User-Oriented RT Service Proposal System in Kukanchi
    Ohira, Anna
    Ngo Trung Lam
    Mizukawa, Makoto
    Ando, Yoshinobu
    Yoshimi, Takashi
    17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 : 421 - 429