An opcode-based technique for polymorphic Internet of Things malware detection

被引:59
作者
Darabian, Hamid [1 ]
Dehghantanha, Ali [2 ]
Hashemi, Sattar [1 ]
Homayoun, Sajad [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Shiraz Univ, Dept Comp Engn, Shiraz, Iran
[2] Univ Guelph, Sch Comp Sci, Guelph, ON, Canada
[3] Shiraz Univ Technol, Dept Comp Engn & Informat Technol, Shiraz, Iran
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
IoT malware; IoT security; malware detection; polymorphic malware; CHALLENGES; FORENSICS; SECURITY;
D O I
10.1002/cpe.5173
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing popularity of Internet of Things (IoT) devices makes them an attractive target for malware authors. In this paper, we use sequential pattern mining technique to detect most frequent opcode sequences of malicious IoT applications. Detected maximal frequent patterns (MFP) of opcode sequences can be used to differentiate malicious from benign IoT applications. We then evaluate the suitability of MFPs as a classification feature for K nearest neighbors (KNN), support vector machines (SVM), multilayer perceptron (MLP), AdaBoost, decision tree, and random forest classifier. Specifically, we achieve an accuracy rate of 99% in the detection of unseen IoT malware. We also demonstrate the utility of our approach in detecting polymorphed IoT malware samples.
引用
收藏
页数:14
相关论文
共 38 条
  • [1] AGRAWAL R, 1995, PROC INT CONF DATA, P3, DOI 10.1109/ICDE.1995.380415
  • [2] [Anonymous], INT DIS
  • [3] [Anonymous], CONCURR COMPUT PRACT
  • [4] [Anonymous], ARM THUMB 2 INSTR SE
  • [5] [Anonymous], WHAT IS MAPREDUCE
  • [6] [Anonymous], ARM V6 M ARCH REF MA
  • [7] [Anonymous], HEIGHT DDOS THREAT P
  • [8] [Anonymous], 2016, IOT DEV BEING INCR U
  • [9] [Anonymous], 2012 INT C E LEARN E
  • [10] Detecting crypto-ransomware in IoT networks based on energy consumption footprint
    Azmoodeh, Amin
    Dehghantanha, Ali
    Conti, Mauro
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1141 - 1152