Data-Driven Malware Detection for 6G Networks: A Survey From the Perspective of Continuous Learning and Explainability via Visualisation

被引:11
作者
Uysal, Dilara T. [1 ]
Yoo, Paul D. [1 ]
Taha, Kamal [2 ]
机构
[1] Univ London, Birkbeck Coll, Dept Comp Sci & Informat Syst, London WC 1E 7HX, England
[2] Khalifa Univ, Ctr Cyber Phys Syst C2PS, Abu Dhabi 127788, U Arab Emirates
来源
IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY | 2023年 / 4卷
关键词
Malware detection; dynamic/hybrid/static analysis; malware images; segmentation; machine learning; continuous machine learning and explainability; DETECTION SYSTEM; SECURITY; PRIVACY;
D O I
10.1109/OJVT.2022.3219898
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
5G is inherently prone to security vulnerabilities. We witness that many today's networks contain 5G security flaws due to their reliance on the existing 4G network core. A lack of security standards for 5G IoT devices means network breaches and malware threats might run uncontrolled. The future 6G network is predicted to be implemented with artificial intelligence-driven communication via machine learning, enhanced edge computing, post-quantum cryptography and so forth. With the activation of edge computing, the computing power available at supercomputing servers is to be integrated directly into the devices at the entry point of a network in a distributed manner (e.g., antennas, routers, IoT sensors, etc). This feature brings an equal quality of service everywhere including remote regions (a.k.a service everywhere) which will trigger an exponential growth of associated applications. In this intricate environment, malware attacks are becoming more challenging to detect. This paper thus reviews the theoretical and experimental data-driven malware detection literature, in the large-scale data-intensive field, relating to: (1) continuous learning, including new concepts in multi-domain to multi-target learning and the challenges associated with unseen/unknown data, imbalance data and data scarcity, and (2) new explainability via visualisation concepts with a multi-labelling approach which allows identifying malware by their recipes while improving the interpretability of its decision process.
引用
收藏
页码:61 / 71
页数:11
相关论文
共 98 条
  • [1] Malware Detection in Cloud Infrastructures using Convolutional Neural Networks
    Abdelsalam, Mahmoud
    Krishnan, Ram
    Huang, Yufei
    Sandhu, Ravi
    [J]. PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 162 - 169
  • [2] Android Ransomware Detection Based on Dynamic Obtained Features
    Abdullah, Zubaile
    Muhadi, Farah Waheeda
    Saudi, Madihah Mohd
    Hamid, Isredza Rahmi A.
    Foozy, Cik Feresa Mohd
    [J]. RECENT ADVANCES ON SOFT COMPUTING AND DATA MINING (SCDM 2020), 2020, 978 : 121 - 129
  • [3] A Multilayer Deep Learning Approach for Malware Classification in 5G-Enabled IIoT
    Ahmed, Imran
    Anisetti, Marco
    Ahmad, Awais
    Jeon, Gwanggil
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) : 1495 - 1503
  • [4] Alam M. S., 2013, P IEEE INT C GREEN C, P663, DOI [10.1109/GreenCom-iThings-CPSCom.2013.122, DOI 10.1109/GREENCOM-ITHINGS-CPSCOM.2013.122]
  • [5] A Comprehensive API Call Analysis for Detecting Windows-Based Ransomware
    Anand, P. Mohan
    Charan, P. V. Sai
    Shukla, Sandeep K.
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 337 - 344
  • [6] Anderson H. S., 2018, arXiv
  • [7] Ankita A, 2021, PROC 4 INT C COMPUT, P39, DOI [10.1109/CCICT53244.2021.00019, DOI 10.1109/CCICT53244.2021.00019]
  • [8] [Anonymous], MICROSOFT MALWARE CL
  • [9] [Anonymous], VX HEAVEN
  • [10] [Anonymous], VIRUSTOTAL API