Combined side-channels malware detection for NFV infrastructure

被引:0
|
作者
Sergeev, Andrew [1 ]
ben-Sa'adon, Eyal [1 ]
Tannenbaum, Elad [1 ]
Saar, Asi [1 ]
机构
[1] ADVA Opt Networking, Raanana, Israel
来源
THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019) | 2019年
关键词
NFV; malware detection; side-channels; machine learning; latency measurement;
D O I
10.1145/3360664.3360727
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Network Function Virtualization (NFV) is an emerging approach gaining popularity among network providers. Nowadays, NFV infrastructure platforms are, predominantly based on x86 architecture CPUs. However, vulnerabilities of the CPU architecture may allow an attacker to obtain root privileges and to plant malware. Among such malware is crypto mining, which is hardly detectable either by malware scanner or by a firewall. In this paper we investigate the applicability of side-channels Key Performance Indicators (KPIs) for malware detection. We propose detecting the abnormal behavior using Machine Learning tools. Upon analyzing different side-channel technologies, we suggest using a combination of CPU performance KPIs with KPIs for the forwarding latency of NFV applications as an input to a Neural Network model. The model shall be trained in advance using two data sets: one set representing a clean system and the second set a compromised system (containing planted crypto-mining malware). The proposed approach would allow us to detect abnormal behavior caused by activation of the malware.
引用
收藏
页数:2
相关论文
共 50 条
  • [21] Leveraging Side-Channels to Turn Processors into Low Overhead Radios
    Feng, Justin
    Jacques, Timothy
    Abari, Omid
    Sehatbakhsh, Nader
    PROCEEDINGS OF THE 2023 THE 22ND INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, IPSN 2023, 2023, : 360 - 361
  • [22] Hardware trojan side-channels based on physical unclonable functions
    Gong, Zheng
    Makkes, Marc X.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6633 : 294 - 303
  • [23] Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
    Lin, Lang
    Kasper, Markus
    Gueneysu, Tim
    Paar, Christof
    Burleson, Wayne
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 382 - +
  • [24] Gray-Box Software Integrity Checking via Side-Channels
    Liu, Hong
    Vasserman, Eugene Y.
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 3 - 23
  • [25] Side-Channels Beyond the Cloud Edge : New Isolation Threats and Solutions
    Bazm, Mohammad-Mahdi
    Lacoste, Marc
    Sudholt, Mario
    Menaud, Jean-Marc
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [26] Trained to Leak: Hiding Trojan Side-Channels in Neural Network Weights
    Meyers, Vincent
    Hefenbrock, Michael
    Gnad, Dennis
    Tahoori, Mehdi
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 122 - 127
  • [27] Lattice Boltzmann Simulation on Flow Fields Connected with Multiple Side-Channels
    Tsushima, Shohji
    Moriyama, Koji
    Hirai, Shuichiro
    HEAT TRANSFER-ASIAN RESEARCH, 2007, 36 (02): : 96 - 104
  • [28] Whispering Devices: A Survey on How Side-channels Lead to Compromised Information
    Corentin Lavaud
    Robin Gerzaguet
    Matthieu Gautier
    Olivier Berder
    Erwan Nogues
    Stephane Molton
    Journal of Hardware and Systems Security, 2021, 5 (2) : 143 - 168
  • [29] Lattice boltzmann simulation on flow fields connected with multiple side-channels
    Tsushima, Shohji
    Moriyama, Koji
    Hirai, Shuichiro
    Nihon Kikai Gakkai Ronbunshu, B Hen/Transactions of the Japan Society of Mechanical Engineers, Part B, 2006, 72 (06): : 1613 - 1618
  • [30] Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels
    Khalili, Hossein
    Chen, Alexander
    Papaiakovou, Theodoros
    Jacques, Timothy
    Chien, Hao-Jen
    Liu, Changwei
    Ding, Aolin
    Hass, Amin
    Zonouz, Saman
    Sehatbakhsh, Nader
    PROCEEDINGS 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, SPW 2024, 2024, : 260 - 266