Accurate and Robust Malware Detection: Running XGBoost on Runtime Data From Performance Counters

被引:10
作者
Elnaggar, Rana [1 ]
Servadei, Lorenzo [2 ,3 ]
Mathur, Shubham [4 ,5 ]
Wille, Robert [6 ]
Ecker, Wolfgang [7 ,8 ]
Chakrabarty, Krishnendu [1 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
[2] Infineon Technol, Power & Sensors Syst, D-85579 Neubiberg, Germany
[3] Johannes Kepler Univ Linz, A-4040 Linz, Austria
[4] Duke Univ, Durham, NC 27708 USA
[5] Cornell Univ, Mech & Aerosp Engn Dept, Ithaca, NY 14850 USA
[6] Johannes Kepler Univ Linz, Inst Integrated Circuits, A-4040 Linz, Austria
[7] Infineon Technol, Design Enabling & Serv, D-85579 Neubiberg, Germany
[8] Tech Univ Munich, Dept Design Automat, D-80333 Munich, Germany
关键词
Malware; Robustness; Training; Microprocessors; Hardware; Perturbation methods; Monitoring; Computer security; machine learning; microprocessors;
D O I
10.1109/TCAD.2021.3102007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware applications are one of the major threats that computing systems face today. While security researchers develop new defense mechanisms to detect malware, attackers continue to release new malware families that evade detection. New defense mechanisms must therefore be developed to effectively counter malware. Hardware performance counters (HPCs) have been recently proposed as a means to detect malware. However, recent work has also shown that malware detection is not effective when performance counters are sampled in realistic scenarios. We show how proper data preprocessing and the use of the XGBoost classifier can be used to improve the performance of malware detection using HPCs by at least 15%. We also show that the proposed method can detect malware early (shortly after its launch) by classifying HPC datastreams at short time intervals. In addition, we propose a multitemporal classification model that ensures the early detection of a high percentage of malware while maintaining overall low false positive rates. Finally, we show that through robust training, the XGBoost classifier shows up to 50x less vulnerability to adversarial attacks that are intended to undermine its malware detection performance.
引用
收藏
页码:2066 / 2079
页数:14
相关论文
共 52 条
[1]   Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J].
Al-Dujaili, Abdullah ;
Huang, Alex ;
Hemberg, Erik ;
O'reilly, Una-May .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :76-82
[2]  
[Anonymous], TIME TAKEN MALWARE I
[3]  
[Anonymous], 2013, ACM SIGARCH computer architecture news
[4]  
[Anonymous], 2001, IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence
[5]  
[Anonymous], 2019, McAfee Labs Threats Report, Q1
[6]  
[Anonymous], NINITE
[7]  
[Anonymous], 2019, ORACLE KPMG CLOUD TH
[8]  
[Anonymous], SAMBA
[9]  
[Anonymous], 2010, 2010 INT C BROADBAND, DOI DOI 10.1109/BWCCA.2010.85
[10]  
[Anonymous], 2019, PR MACH LEARN RES