Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features

被引:25
作者
Tien, Chin-Wei [1 ]
Chen, Shang-Wen [1 ]
Ban, Tao [2 ]
Kuo, Sy-Yen [3 ]
机构
[1] Inst Informat Ind, Taipei, Taiwan
[2] Natl Inst Informat & Commun Technol, Tokyo, Japan
[3] Natl Taiwan Univ, Taipei, Taiwan
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2020年 / 1卷 / 01期
关键词
ELF analysis; IoT security; malware detection; malware classification; machine learning; opcode analysis; CLASSIFICATION;
D O I
10.1145/3378448
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threats to devices that are part of the Internet of Things (IoT) are on the rise. Owing to the overwhelming diversity of IoT hardware and software, as well as its variants, conventional anti-virus techniques based on the Windows paradigm cannot be applied directly to counter threats to the IoT devices. In this article, we propose a framework that can efficiently analyze IoT malware in a wide range of environments. It consists of a universal feature representation obtained by static analysis of the malware and a machine learning scheme that first detects the malware and then classifies it into a known category. The framework was evaluated by applying it to a recently developed dataset consisting of more than 6,000 IoT malware samples collected from the HoneyPot project. The results show that the proposed method can obtain near-optimal accuracy in terms of the detection and classification of malware targeting IoT devices.
引用
收藏
页数:19
相关论文
共 55 条
  • [41] Sun Microsystems, 1998, SPARC Assembly Language Reference Manual
  • [42] TensorFlow, Home Page
  • [43] Tian R, 2008, MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P79
  • [44] Trinius P., 2009, A malware instruction set for behavior-based analysis
  • [45] Tzu-Yen Wang, 2009, Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC, P278, DOI 10.1109/NCM.2009.385
  • [46] VirusTotal, Home Page
  • [47] Wagner D., 2000, Ph.D. Dissertation
  • [48] Walenstein Andrew, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P15, DOI 10.1109/MALWARE.2010.5665799
  • [49] Wikipedia, BASHLITE
  • [50] Wikipedia, 2019, Mirai (Malware)