title | date | excerpt | author | website | tags | team | sponsor | mentor | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
MLDefender |
2023-02-26 |
Hackers hide malware in images by appending text to the file, using steganography to alter pixels, and exploiting file format vulnerabilities to execute malware. |
|
|
|
|
|
Hackers use various techniques to hide malware in images such as appending a string of text to the end of a file which does not change the visual appearance of the image, using image steganography to alter several pixels to embed malicious code and exploit vulnerabilities in image file formats to execute malware.
This project contains the following components:
- Image steganography detection ML algorithms
- Anti-malware software for image-based malware detection
- Documentation best practices for defending against image-based malware
To defend against image-based malware, organizations can use image steganography detection techniques such as analyzing slight color differences between two images, large amount of duplicate colors within an image, and size difference of image as indicators of image steganography. Additionally, organizations can use anti-malware software that is specifically designed to detect image-based malware and educate employees to be vigilant when opening image files from unknown sources.
The detection process begins when an employee reports a suspicious image file in a received phishing email, or the security team receives an alert about a malicious outbound communication to a known malicious IP address. The reported file is stored in an isolated location to prevent accidental infection. If the file is identified as malicious through signature-based detection(refer figure 1.1), preventive actions are taken, such as isolating the infected machine or updating security policies to block the malware. If the file is not identified as malicious, it is analyzed structurally and statistically. Structural analysis on file metadata includes checks for changes in timestamp, unusual file properties, and anomalies in the Exif header content, using open-source tools and StegSpy. Statistical analysis is performed done make an REST API call to prediction server hosting SteganoML, a CNN model(refer Code Snippet 1.1 ) hosted on AWS Lambda, to detect and classify the malware into 25 different types (e.g., Trojan, Rogue, Dialer, etc..).
We propose an intelligent machine learning model for Endpoint detection and response, which none of the mentioned vendors (Crowdstrike, Opswat) offer.
- Machine Learning
- Stegnography
- Python
- AWS Lambda
- REST API
- HTML
- CSS
- JQUERY
Update the src link with the embedded link of your video.
<iframe width="560" height="315" src="#" title="MLDefender" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>Reach out to the principal researchers if you are interested in supporting this project.
Role | Skills |
---|---|
UI | React, HTML, CSS |
Backend | Python |
Machine Learning Specilist |