Malware Detection Based on Deep Learning of Behavior Graphs

被引:55
作者
Xiao, Fei [1 ,2 ,3 ]
Lin, Zhaowen [1 ,2 ,3 ]
Sun, Yi [2 ,3 ,4 ]
Ma, Yan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Inst Network Technol, Network & Informat Ctr, Beijing 100876, Peoples R China
[2] Sci & Technol Informat Transmiss & Disseminat Com, Shijiazhuang 050081, Hebei, Peoples R China
[3] Beijing Univ Posts & Telecommun, Natl Engn Lab Mobile Network Secur, Beijing 100876, Peoples R China
[4] Beijing Univ Posts & Telecommun, Inst Sensing Technol & Business, Inst Network Technol, Network & Informat Ctr, Beijing 100000, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTOENCODER; INTERNET; THINGS; MODEL;
D O I
10.1155/2019/8195395
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Internet of Things (IoT) provides various benefits, which makes smart device even closer. With more and more smart devices in IoT, security is not a one-device affair. Many attacks targeted at traditional computers in IoT environment may also aim at other IoT devices. In this paper, we consider an approach to protect IoT devices from being attacked by local computers. In response to this issue, we propose a novel behavior-based deep learning framework (BDLF) which is built in cloud platform for detecting malware in IoT environment. In the proposed BDLF, we first construct behavior graphs to provide efficient information of malware behaviors using extracted API calls. We then use a neural network-Stacked AutoEncoders (SAEs) for extracting high-level features from behavior graphs. The layers of SAEs are inserted one after another and the last layer is connected to some added classifiers. The architecture of the SAEs is 6,000-2,000-500. The experiment results demonstrate that the proposed BDLF can learn the semantics of higher-level malicious behaviors from behavior graphs and further increase the average detection precision by 1.5%.
引用
收藏
页数:10
相关论文
共 45 条
[1]  
Abhishek B. S., 2017, P 13 INT WORKSH MIN
[2]  
Alhanahnah M, 2018, IEEE CONF COMM NETW
[3]  
[Anonymous], 2016, Internet Security Threat Report
[4]  
[Anonymous], P ACM SIGSOFT 20 INT
[5]  
Bayer Ulrich, 2009, 16 ANN NETW DISTR SY
[6]  
Canali D., 2012, ISSTA, P122, DOI [10.1145/2338965.2336768, DOI 10.1145/2338965.2336768]
[7]   Control Flow-Based Malware Variant Detection [J].
Cesare, Silvio ;
Xiang, Yang ;
Zhou, Wanlei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (04) :304-317
[8]  
Chandramohan M, 2013, IEEE INT CONF AUTOM, P312, DOI 10.1109/ASE.2013.6693090
[9]   Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware [J].
Das, Sanjeev ;
Liu, Yang ;
Zhang, Wei ;
Chandramohan, Mahintham .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :289-302
[10]  
Donahue J, 2015, PROC CVPR IEEE, P2625, DOI 10.1109/CVPR.2015.7298878