Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning

被引:187
作者
Azmoodeh, Amin [1 ]
Dehghantanha, Ali [2 ]
Choo, Kim-Kwang Raymond [3 ,4 ]
机构
[1] Shiraz Univ, Dept Elect & Comp Engn, Shiraz 713451978, Iran
[2] Univ Sheffield, Dept Comp Sci, Sheffield S10 2TN, S Yorkshire, England
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[4] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2019年 / 4卷 / 01期
关键词
Internet of things malware; intemet of battlefield things; malware detection; deep eigenspace learning; deep learning; machine learning; NETWORKS;
D O I
10.1109/TSUSC.2018.2809665
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-connected devices and nodes (e.g., medical devices and wearable combat uniforms). These loT devices and nodes are a valuable target for cyber criminals, particularly state-sponsored or nation state actors. A common attack vector is the use of malware. In this paper, we present a deep learning based method to detect Internet Of Battlefield Things (IoBT) malware via the device's Operational Code (OpCode) sequence. We transmute OpCodes into a vector space and apply a deep Eigenspace learning approach to classify malicious and benign applications. We also demonstrate the robustness of our proposed approach in malware detection and its sustainability against junk code insertion attacks. Lastly, we make available our malware sample on Github, which hopefully will benefit future research efforts (e.g., to facilitate evaluation of future malware detection approaches).
引用
收藏
页码:88 / 95
页数:8
相关论文
共 43 条
[1]  
Alam M.S., 2013, 2013 IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing, P663, DOI DOI 10.1109/GREENCOM-ITHINGS-CPSCOM.2013.122
[2]   Graph-based malware detection using dynamic analysis [J].
Anderson, Blake ;
Quist, Daniel ;
Neil, Joshua ;
Storlie, Curtis ;
Lane, Terran .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04) :247-258
[3]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[4]  
Bengio Y, 2004, J MACH LEARN RES, V5, P1089
[5]   Opcodes as predictor for malware [J].
Bilar, Daniel .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (02) :156-168
[6]  
Brash D., 2010, P IEEE INT C COMP DE, pXIX
[7]  
Chung F.R, 1997, Spectral Graph Theory, V92
[8]  
Cook Diane J, 2006, Mining graph data
[9]  
Demme J., 2013, 40 ANN INT S COMP AR, P559, DOI 10.1145/2485922
[10]  
Deng L, 2014, Foundations and Trends in Signal Processing: DEEP LEARNING-Methods and Applications, DOI [DOI 10.1561/2000000039, 10.1561/]