Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection

被引:12
作者
He, Zhangying [1 ]
Rezaei, Amin [1 ]
Homayoun, Houman [2 ]
Sayadi, Hossein [1 ]
机构
[1] Calif State Univ, Long Beach, CA 90032 USA
[2] Univ Calif Davis, Davis, CA 95616 USA
来源
PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022 | 2022年
关键词
Deep Learning; Hardware-Based Malware Detection; Machine Learning; Transfer Learning; Zero-Day Attack;
D O I
10.1145/3526241.3530326
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, security researchers have shifted their attentions to the underlying processors' architecture and proposed Hardware-Based Malware Detection (HMD) countermeasures to address inefficiencies of software-based detection methods. HMD techniques apply standard Machine Learning (ML) algorithms to the processors' low-level events collected from Hardware Performance Counter (HPC) registers. However, despite obtaining promising results for detecting known malware, the challenge of accurate zero-day (unknown) malware detection has remained an unresolved problem in existing HPC-based countermeasures. Our comprehensive analysis shows that standard ML classifiers are not effective in recognizing zero-day malware traces using HPC events. In response, we propose Deep-HMD, a two-stage intelligent and flexible approach based on deep neural network and transfer learning, for accurate zero-day malware detection based on image-based hardware events. The experimental results indicate that our proposed solution outperforms existing ML-based methods by achieving a 97% detection rate (F-Measure and Area Under the Curve) for detecting zero-day malware signatures at run-time using the top 4 hardware events with a minimal false positive rate and no hardware redesign overhead.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 50 条
  • [21] Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier
    Zahoora, Umme
    Rajarajan, Muttukrishnan
    Pan, Zahoqing
    Khan, Asifullah
    APPLIED INTELLIGENCE, 2022, 52 (12) : 13941 - 13960
  • [22] Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices
    Popoola, Segun, I
    Ande, Ruth
    Adebisi, Bamidele
    Gui, Guan
    Hammoudeh, Mohammad
    Jogunola, Olamide
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3930 - 3944
  • [23] Malware detection employed by visualization and deep neural network
    Pinhero, Anson
    Anupama, M. L.
    Vinod, P.
    Visaggio, C. A.
    Aneesh, N.
    Abhijith, S.
    AnanthaKrishnan, S.
    COMPUTERS & SECURITY, 2021, 105
  • [24] From zero-shot machine learning to zero-day attack detection
    Mohanad Sarhan
    Siamak Layeghy
    Marcus Gallagher
    Marius Portmann
    International Journal of Information Security, 2023, 22 : 947 - 959
  • [25] From zero-shot machine learning to zero-day attack detection
    Sarhan, Mohanad
    Layeghy, Siamak
    Gallagher, Marcus
    Portmann, Marius
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 947 - 959
  • [26] An Enhanced Deep Learning Neural Network for the Detection and Identification of Android Malware
    Musikawan, Pakarat
    Kongsorot, Yanika
    You, Ilsun
    So-In, Chakchai
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8560 - 8577
  • [27] Image-Based Zero-Day Malware Detection in IoMT Devices: A Hybrid AI-Enabled Method
    He, Zhangying
    Sayadi, Hossein
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 82 - 89
  • [28] Mecha: A Neural-Symbolic Open-Set Homogeneous Decision Fusion Approach for Zero-Day Malware Similarity Detection
    Molloy, Christopher
    Banks, Jeremy
    Ding, Steven H. H.
    Alaca, Furkan
    Charland, Philippe
    Walenstein, Andrew
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2025, 51 (02) : 621 - 637
  • [29] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    ELECTRONICS, 2022, 11 (23)
  • [30] A zero-day resistant malware detection method for securing Cloud using SVM and Sandboxing Techniques
    Kumar, Saket
    Singh, Chandra Bhim Bhan
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1397 - 1402