A Friend or a Foe? Detecting Malware using Memory and CPU Features

被引:13
作者
Milosevic, Jelena [1 ]
Malek, Miroslaw [1 ]
Ferrante, Alberto [1 ]
机构
[1] Univ Svizzera Italiana, ALaRI, Fac Informat, Lugano, Switzerland
来源
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4 | 2016年
关键词
Malware Detection; Dynamic Detection; Android; Internet of Things (IoT); CLASSIFICATION;
D O I
10.5220/0005964200730084
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With an ever-increasing and ever more aggressive proliferation of malware, its detection is of utmost importance. However, due to the fact that IoT devices are resource-constrained, it is difficult to provide effective solutions. The main goal of this paper is the development of lightweight techniques for dynamic malware detection. For this purpose, we identify an optimized set of features to be monitored at runtime on mobile devices as well as detection algorithms that are suitable for battery-operated environments. We propose to use a minimal set of most indicative memory and CPU features reflecting malicious behavior. The performance analysis and validation of features usefulness in detecting malware have been carried out by considering the Android operating system. The results show that memory and CPU related features contain enough information to discriminate between execution traces belonging to malicious and benign applications with significant detection precision and recall. Since the proposed approach requires only a limited number of features and algorithms of low complexity, we believe that it can be used for effective malware detection, not only on mobile devices, but also on other smart elements of IoT.
引用
收藏
页码:73 / 84
页数:12
相关论文
共 32 条
[21]   Toward integrating feature selection algorithms for classification and clustering [J].
Liu, H ;
Yu, L .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (04) :491-502
[22]   VirusMeter: Preventing Your Cellphone from Spies [J].
Liu, Lei ;
Yan, Guanhua ;
Zhang, Xinwen ;
Chen, Songqing .
RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 :244-+
[23]  
McAfee Labs, 2015, THREATS REP
[24]   A Resource-optimized Approach to Efficient Early Detection of Mobile Malware [J].
Milosevic, Jelena ;
Dittrich, Andreas ;
Ferrante, Alberto ;
Malek, Miroslaw .
2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, :333-340
[25]  
Milosevic J., 2016, CCNC 2016
[26]   Limits of static analysis for malware detection [J].
Moser, Andreas ;
Kruegel, Christopher ;
Kirda, Engin .
TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, :421-430
[27]  
QUINLAN JR, 1993, C4 5 PROGRAMS MACHIN
[28]   "Andromaly": a behavioral malware detection framework for android devices [J].
Shabtai, Asaf ;
Kanonov, Uri ;
Elovici, Yuval ;
Glezer, Chanan ;
Weiss, Yael .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 38 (01) :161-190
[29]  
Symantec Corporation, 2015, TECHNICAL REPORT
[30]  
Truong H. T. T., 2013, CORR