MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems

Min Hao Wu, Fu Hau Hsu, Jian Hong Hunag, Keyuan Wang, Yen Yu Liu, Jian Xin Chen, Hao Jyun Wang, Hao Tsung Yang

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

This manuscript introduces MPSD (Malicious PowerShell Script Detector), an advanced tool to protect Windows systems from malicious PowerShell commands and scripts commonly used in fileless malware attacks. These scripts are often hidden in Office document macros or downloaded remotely via PowerShell, posing significant threats to corporate networks. A 2018 report revealed that 77% of successful cyberattacks involved fileless malware, with PowerShell being the primary attack method, as highlighted in Red Canary’s 2022 report. To counter these threats, MPSD leverages the Antimalware Scan Interface (AMSI) to intercept and analyze real-time PowerShell scripts, preventing their execution. It further utilizes VirusTotal to filter out malicious scripts. Unlike traditional methods that rely on direct access to scripts, MPSD detects them before execution, addressing the challenge of hidden or obfuscated scripts. Experimental results show that MPSD outperforms well-known antivirus engines, with a low false-negative rate of 1.83%. MPSD is highly effective against evasion techniques like concatenation, encoding, and reordering, making it a robust tool in the cybersecurity landscape.

Original languageEnglish
Article number3717
JournalElectronics (Switzerland)
Volume13
Issue number18
DOIs
StatePublished - Sep 2024

Keywords

  • Antimalware Scan Interface
  • malware detection
  • PowerShell commands
  • VirusTotal
  • Windows security

Fingerprint

Dive into the research topics of 'MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems'. Together they form a unique fingerprint.

Cite this