TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning

被引:0
作者
Nahmias, Daniel [1 ,2 ]
Cohen, Aviad [1 ,2 ]
Nissim, Nir [1 ,3 ]
Elovici, Yuval [1 ,2 ]
机构
[1] Ben Gurion Univ Negev, Cyber Secur Res Ctr, Malware Lab, Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
[3] Ben Gurion Univ Negev, Dept Ind Engn & Management, Beer Sheva, Israel
来源
2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2019年
关键词
Deep Learning; Transfer Learning; Convolutional Neural Networks; Malware; Cryptojacking; Automatic Signature Generation; CONDITION SEVERITY CLASSIFICATION; METHODOLOGY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents TrustSign, a novel, trusted automatic malware signature generation method based on high-level deep features transferred from a VGG-19 neural network model pre-trained on the ImageNet dataset. While traditional automatic malware signature generation techniques rely on static or dynamic analysis of the malware's executable, our method overcomes the limitations associated with these techniques by producing signatures based on the presence of the malicious process in the volatile memory. Signatures generated using TrustSign well represent the real malware behavior during runtime. By leveraging the cloud's virtualization technology, TrustSign analyzes the malicious process in a trusted manner, since the malware is unaware and cannot interfere with the inspection procedure. Additionally, by removing the dependency on the malware's executable, our method is capable of signing fileless malware. Thus, we focus our research on in-browser cryptojacking attacks, which current antivirus solutions have difficulty to detect. However, TrustSign is not limited to cryptojacking attacks, as our evaluation included various ransomware samples. TrustSign's signature generation process does not require feature engineering or any additional model training, and it is done in a completely unsupervised manner, obviating the need for a human expert. Therefore, our method has the advantage of dramatically reducing signature generation and distribution time. The results of our experimental evaluation demonstrate TrustSign's ability to generate signatures invariant to the process state over time. By using the signatures generated by TrustSign as input for various supervised classifiers, we achieved 99.5% classification accuracy.
引用
收藏
页数:8
相关论文
共 50 条
[11]   Malware Detection Using Deep Learning and Correlation-Based Feature Selection [J].
Alomari, Esraa Saleh ;
Nuiaa, Riyadh Rahef ;
Alyasseri, Zaid Abdi Alkareem ;
Mohammed, Husam Jasim ;
Sani, Nor Samsiah ;
Esa, Mohd Isrul ;
Musawi, Bashaer Abbuod .
SYMMETRY-BASEL, 2023, 15 (01)
[12]   Malware Image Generation and Detection Method Using DCGANs and Transfer Learning [J].
Peppes, Nikolaos ;
Alexakis, Theodoros ;
Daskalakis, Emmanouil ;
Demestichas, Konstantinos ;
Adamopoulou, Evgenia .
IEEE ACCESS, 2023, 11 :105872-105884
[13]   Deep learning feature exploration for Android malware detection [J].
Zhang, Nan ;
Tan, Yu-an ;
Yang, Chen ;
Li, Yuanzhang .
APPLIED SOFT COMPUTING, 2021, 102
[14]   Malware Detection using Malware Image and Deep Learning [J].
Choi, Sunoh ;
Jang, Sungwook ;
Kim, Youngsoo ;
Kim, Jonghyun .
2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, :1193-1195
[15]   Data augmentation and transfer learning to classify malware images in a deep learning context [J].
Marastoni, Niccolo ;
Giacobazzi, Roberto ;
Dalla Preda, Mila .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (04) :279-297
[16]   Data augmentation and transfer learning to classify malware images in a deep learning context [J].
Niccolò Marastoni ;
Roberto Giacobazzi ;
Mila Dalla Preda .
Journal of Computer Virology and Hacking Techniques, 2021, 17 :279-297
[17]   Deep Feature Learning for Intrinsic Signature Based Camera Discrimination [J].
Banerjee, Chaity ;
Doppalapudi, Tharun Kumar ;
Pasiliao, Eduardo, Jr. ;
Mukherjee, Tathagata .
BIG DATA MINING AND ANALYTICS, 2022, 5 (03) :206-227
[18]   A Malware Detection Approach Using Autoencoder in Deep Learning [J].
Xing, Xiaofei ;
Jin, Xiang ;
Elahi, Haroon ;
Jiang, Hai ;
Wang, Guojun .
IEEE ACCESS, 2022, 10 :25696-25706
[19]   Malware identification using visualization images and deep learning [J].
Ni, Sang ;
Qian, Quan ;
Zhang, Rui .
COMPUTERS & SECURITY, 2018, 77 :871-885
[20]   DroidDeepLearner: Identifying Android Malware Using Deep Learning [J].
Wang, Zi ;
Cai, Juecong ;
Cheng, Sihua ;
Li, Wenjia .
2016 IEEE 37TH SARNOFF SYMPOSIUM, 2016, :160-165