Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments

被引:32
作者
Nahmias, Daniel [1 ,2 ]
Cohen, Aviad [1 ,2 ]
Nissim, Nir [1 ,3 ]
Elovici, Yuval [1 ,2 ]
机构
[1] Ben Gurion Univ Negev, Malware Lab, Cyber Secur Res Ctr, Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
[3] Ben Gurion Univ Negev, Dept Ind Engn & Management, Beer Sheva, Israel
关键词
Deep learning; Transfer learning; Convolutional neural networks; Malware detection; Cryptojacking; Automatic signature generation; METHODOLOGY;
D O I
10.1016/j.neunet.2020.01.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents TrustSign, a novel, trusted automatic malware signature generation method based on high-level deep features transferred from a VGG-19 neural network model pretrained on the ImageNet dataset. While traditional automatic malware signature generation techniques rely on static or dynamic analysis of the malware's executable, our method overcomes the limitations associated with these techniques by producing signatures based on the presence of the malicious process in the volatile memory. By leveraging the cloud's virtualization technology, TrustSign analyzes the malicious process in a trusted manner, since the malware is unaware and cannot interfere with the inspection procedure. Additionally, by removing the dependency on the malware's executable, our method is fully capable of signing fileless malware as well. TrustSign's signature generation process does not require feature engineering or any additional model training, and it is done in a completely unsupervised manner, eliminating the need for a human expert. Because of this, our method has the advantage of dramatically reducing signature generation and distribution time. In fact, in this paper we rethink the typical use of deep convolutional neural networks and use the VGG-19 model as a topological feature extractor for a vastly different task from the one it was trained for. The results of our experimental evaluation demonstrate TrustSign's ability to generate signatures impervious to the process state over time. By using the signatures generated by TrustSign as input for various supervised classifiers, we achieved up to 99.5% classification accuracy. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页码:243 / 257
页数:15
相关论文
共 51 条
[31]  
Janowczyk A., 2016, J PATHOLOGY INFORN
[32]   Honeycomb - Creating intrusion detection signatures using honeypots [J].
Kreibich, C ;
Crowcroft, J .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (01) :51-56
[33]   Backpropagation Applied to Handwritten Zip Code Recognition [J].
LeCun, Y. ;
Boser, B. ;
Denker, J. S. ;
Henderson, D. ;
Howard, R. E. ;
Hubbard, W. ;
Jackel, L. D. .
NEURAL COMPUTATION, 1989, 1 (04) :541-551
[34]  
Marpaung J. A. P., 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT), P744
[35]  
Netanyahu N. S., 2015, P INT JOINT C NEUR N, V2015, P1, DOI [DOI 10.1109/IJCNN.2015.7280815, 10.1109/IJCNN.2015.7280815]
[36]   Polygraph: Automatically generating signatures for polymorphic worms [J].
Newsome, J ;
Karp, B ;
Song, D .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :226-241
[37]   Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining [J].
Nissim, Nir ;
Lapidot, Yuval ;
Cohen, Aviad ;
Elovici, Yuval .
KNOWLEDGE-BASED SYSTEMS, 2018, 153 :147-175
[38]  
Saxe J, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P11, DOI 10.1109/MALWARE.2015.7413680
[39]   F-Sign: Automatic, Function-Based Signature Generation for Malware [J].
Shabtai, Asaf ;
Menahem, Eitan ;
Elovici, Yuval .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2011, 41 (04) :494-508
[40]  
Shaid SZM, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P238, DOI 10.1109/ISBAST.2014.7013128