Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware

被引:124
作者
Das, Sanjeev [1 ]
Liu, Yang [1 ]
Zhang, Wei [2 ]
Chandramohan, Mahintham [1 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
基金
新加坡国家研究基金会;
关键词
Malware detection; hardware-enhanced architecture; runtime security; early prediction; reconfigurable malware detection;
D O I
10.1109/TIFS.2015.2491300
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, malware has increasingly become a critical threat to embedded systems, while the conventional software solutions, such as antivirus and patches, have not been so successful in defending the ever-evolving and advanced malicious programs. In this paper, we propose a hardware-enhanced architecture, GuardOL, to perform online malware detection. GuardOL is a combined approach using processor and field-programmable gate array (FPGA). Our approach aims to capture the malicious behavior (i.e., high-level semantics) of malware. To this end, we first propose the frequency-centric model for feature construction using system call patterns of known malware and benign samples. We then develop a machine learning approach (using multilayer perceptron) in FPGA to train classifier using these features. At runtime, the trained classifier is used to classify the unknown samples as malware or benign, with early prediction. The experimental results show that our solution can achieve high classification accuracy, fast detection, low power consumption, and flexibility for easy functionality upgrade to adapt to new malware samples. One of the main advantages of our design is the support of early prediction-detecting 46% of malware within first 30% of their execution, while 97% of the samples at 100% of their execution, with <3% false positives.
引用
收藏
页码:289 / 302
页数:14
相关论文
共 49 条
[1]  
Andersen S, 2004, Data execution prevention: Changes to functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory protection technologies
[2]  
[Anonymous], 2014, UNOFFICIAL ANAL RETA
[3]  
[Anonymous], 2005, NDSS
[4]  
[Anonymous], 1996, Proceedings of 1996 IEEE Symposium on Security and Privacy, DOI DOI 10.1109/SECPRI.1996.502675
[5]  
[Anonymous], 2003, P NETW DISTR SYST SE
[6]  
[Anonymous], 2014, MCAFEE LABS THREATS
[7]  
[Anonymous], 2015, SHELLSHOCK TECHNICAL
[8]  
[Anonymous], 2012, P 2012 INT C DEPENDA, DOI DOI 10.1109/DSN.2012.6263958
[9]  
ARORA D, 2006, NATO SECURITY SCI D, V2, P18
[10]  
Bahador MB, 2014, 2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), P703, DOI 10.1109/ICCKE.2014.6993402