Combined side-channels malware detection for NFV infrastructure

被引:0
|
作者
Sergeev, Andrew [1 ]
ben-Sa'adon, Eyal [1 ]
Tannenbaum, Elad [1 ]
Saar, Asi [1 ]
机构
[1] ADVA Opt Networking, Raanana, Israel
来源
THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019) | 2019年
关键词
NFV; malware detection; side-channels; machine learning; latency measurement;
D O I
10.1145/3360664.3360727
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Network Function Virtualization (NFV) is an emerging approach gaining popularity among network providers. Nowadays, NFV infrastructure platforms are, predominantly based on x86 architecture CPUs. However, vulnerabilities of the CPU architecture may allow an attacker to obtain root privileges and to plant malware. Among such malware is crypto mining, which is hardly detectable either by malware scanner or by a firewall. In this paper we investigate the applicability of side-channels Key Performance Indicators (KPIs) for malware detection. We propose detecting the abnormal behavior using Machine Learning tools. Upon analyzing different side-channel technologies, we suggest using a combination of CPU performance KPIs with KPIs for the forwarding latency of NFV applications as an input to a Neural Network model. The model shall be trained in advance using two data sets: one set representing a clean system and the second set a compromised system (containing planted crypto-mining malware). The proposed approach would allow us to detect abnormal behavior caused by activation of the malware.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] SCRAMBLESUIT: An effective timing side-channels framework for malware sandbox evasion
    Nappa, Antonio
    Ubeda-Portugues, Aaron
    Papadopoulos, Panagiotis
    Varvello, Matteo
    Tapiador, Juan
    Lanzi, Andrea
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (06) : 851 - 876
  • [2] A Taxonomy of Side-Channels
    Clark, Tristan
    McDonald, Jeffrey T.
    Andel, Todd R.
    Baggett, Brandon
    Mullens, Tristen
    SOUTHEASTCON 2024, 2024, : 1564 - 1570
  • [3] SideGuard: Non-Invasive On-Chip Malware Detection in Heterogeneous IoT Systems by Leveraging Side-Channels
    Arkannezhad, Fatemeh
    Aghanoury, Pooya
    Feng, Justin
    Khalili, Hossein
    Sehatbakhsh, Nader
    PROCEEDINGS 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, SPW 2024, 2024, : 253 - 259
  • [4] Developers: Beware of Timing Side-Channels
    Schneider, Dominik
    Zeitschner, Jannik
    Kloos, Michael
    Lemke-Rust, Kerstin
    Iacono, Luigilo
    IEEE SECURITY & PRIVACY, 2025, 23 (01) : 47 - 52
  • [5] Risks and Benefits of Side-Channels in Battlefields
    Agadakos, Ioannis
    Ciocarlie, Gabriela F.
    Copos, Bogdan
    Lepoint, Tancrede
    Lindqvist, Ulf
    Locasto, Michael E.
    Michaelis, James R.
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 2290 - 2297
  • [6] BRB: Mitigating Branch Predictor Side-Channels
    Vougioukas, Ilias
    Nikoleris, Nikos
    Sandberg, Andreas
    Diestelhorst, Stephan
    Al-Hashimi, Bashir M.
    Merrett, Geoff V.
    2019 25TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2019, : 466 - 477
  • [7] SoCs security: a war against side-channels
    Guilley, S
    Pacalet, R
    ANNALS OF TELECOMMUNICATIONS, 2004, 59 (7-8) : 998 - 1009
  • [8] Domain-Agnostic Representation of Side-Channels
    Spence, Aaron
    Bangay, Shaun
    ENTROPY, 2024, 26 (08)
  • [9] Evaluation of (power) side-channels in cryptographic implementations
    Bache, Florian
    Plump, Christina
    Wloka, Jonas
    Gueneysu, Tim
    Drechsler, Rolf
    IT-INFORMATION TECHNOLOGY, 2019, 61 (01): : 15 - 28
  • [10] Guard Cache: Creating Noisy Side-Channels
    Mosquera, Fernando
    Kavi, Krishna
    Mehta, Gayatri
    John, Lizy
    IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (02) : 97 - 100