IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection

被引:16
作者
Esmaeili, Bardia [1 ]
Azmoodeh, Amin [1 ]
Dehghantanha, Ali [1 ]
Karimipour, Hadis [2 ]
Zolfaghari, Behrouz [1 ]
Hammoudeh, Mohammad [3 ]
机构
[1] Univ Guelph, Cyber Sci Lab, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
[2] Univ Calgary, Elect & Comp Engn, Calgary, AB T2N 1N4, Canada
[3] King Fahd Univ Petr & Minerals, Dept Informat & Comp Sci, Dhahran 31261, Saudi Arabia
关键词
Malware; Industrial Internet of Things; Mathematical models; Training; Informatics; Gray-scale; Feature extraction; Adversarial detection; convolutional neural networks (CNNs); industrial Internet of Things (IIoT); Industry; 4; 0; malware classification; malware threat hunting;
D O I
10.1109/TII.2022.3167672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting widely used deep classifiers against black-box adversarial attacks is a recent research challenge in many security-related areas, including malware classification. This class of attacks relies on optimizing a sequence of highly similar queries to bypass given classifiers. In this article, we leverage this property and propose a history-based method named, stateful query analysis (SQA), which analyzes sequences of queries received by a malware classifier to detect black-box adversarial attacks on an industrial Internet of Things (IIoT). In the SQA pipeline, there are two components, namely the similarity encoder and the classifier, both based on convolutional neural networks. Unlike the state-of-the-art methods, which aim to identify individual adversarial examples, tracking the history of queries allows our method to identify adversarial scenarios and abort attacks before their completion. We optimize SQA using different combinations of hyperparameters on an advanced risc machine (ARM)-based IIoT malware dataset, widely adopted for malware threat hunting in industry 4.0. The use of a novel distance metric in calculating the loss function of the similarity encoder results in more disentangled representations and improves the performance of our method. Our evaluations demonstrate the validity of SQA via a detection rate of 93.1% over a wide range of adversarial examples.
引用
收藏
页码:8477 / 8486
页数:10
相关论文
共 24 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J].
Al-Dujaili, Abdullah ;
Huang, Alex ;
Hemberg, Erik ;
O'reilly, Una-May .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :76-82
[3]   Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers [J].
Alasmary, Hisham ;
Abusnaina, Ahmed ;
Jang, Rhongho ;
Abuhamad, Mohammed ;
Anwar, Afsah ;
Nyang, DaeHun ;
Mohaisen, David .
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, :888-898
[4]   Static malware detection and attribution in android byte-code through an end-to-end deep system [J].
Amin, Muhammad ;
Tanveer, Tamleek Ali ;
Tehseen, Mohammad ;
Khan, Murad ;
Khan, Fakhri Alam ;
Anwar, Sajid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :112-126
[5]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95
[6]  
Chen Steven, 2020, SPAI '20: Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence, P30, DOI 10.1145/3385003.3410925
[7]  
Fanzhi Meng, 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). Proceedings, P576, DOI 10.1109/DSC.2018.00092
[8]   Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT [J].
Farivar, Faezeh ;
Haghighi, Mohammad Sayad ;
Jolfaei, Alireza ;
Alazab, Mamoun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (04) :2716-2725
[9]   A Multimodal Deep Learning Method for Android Malware Detection Using Various Features [J].
Kim, TaeGuen ;
Kang, BooJoong ;
Rho, Mina ;
Sezer, Sakir ;
Im, Eul Gyu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) :773-788
[10]  
Li DQ, 2018, Arxiv, DOI arXiv:1809.06498