Generative adversarial network to detect unseen Internet of Things malware

被引:35
作者
Moti, Zahra [1 ]
Hashemi, Sattar [1 ]
Karimipour, Hadis [2 ]
Dehghantanha, Ali [3 ]
Jahromi, Amir Namavar [2 ]
Abdi, Lida [1 ]
Alavi, Fatemeh [1 ]
机构
[1] Shiraz Univ, Dept Comp Sci & Engn & Informat Technol, Machine Learning Lab, Shiraz, Iran
[2] Univ Guelph, Sch Engn, Smart Cyber Phys Syst Lab, Guelph, ON, Canada
[3] Univ Guelph, Sch Comp Sci, Cyber Sci Lab, Guelph, ON, Canada
关键词
Malware; Generative Adversarial Network (GAN); Deeplearning; Convolutional Neural Network (CNN); Long Short Term Memory (LSTM); Edge layer; Internet of Things; CYBER-ATTACK DETECTION; DEEP; CLASSIFICATION;
D O I
10.1016/j.adhoc.2021.102591
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning is significantly used for malware and adversary detection in the industrial internet of things networks. However, majority of these methods require a significant prior knowledge of malware properties to identify optimal features for malware detection. This is a more significant challenge in IoT environment due to limited availability of malware samples. Some researchers utilized data deformation techniques such as converting malware to images or music to generate features that can be used for malware detection. However, these processes can be time-consuming and require a significant amount of data. This paper proposes MalGan, a framework for detecting and generating new malware samples based on the raw byte code at the edge layer of the Internet of Things (IoT) networks. Convolutional Neural Network (CNN) was utilized to extract high-level features, and boundary-seeking Generative Adversarial Network technique was used to generate new malware samples. Thus, even with a few malware samples, a significant number of previously unseen malware samples are detectable with high accuracy. To capture the short-term and long-term dependency of features, we employed an attention-based model, a combination of CNN and Long Short Term Memory. The attention mechanism improves the model's performance by increasing or decreasing attention to certain parts of the features. The proposed method is examined extensively using standard Windows and IoT malware datasets. The experimental results indicate that our proposed MalGan is the method of choice, as it offers a higher detection rate compared to the previous malware detection algorithms.
引用
收藏
页数:13
相关论文
共 60 条
[1]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[2]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[3]   Android malware detection through generative adversarial networks [J].
Amin, Muhammad ;
Shah, Babar ;
Sharif, Aizaz ;
Alit, Tamleek ;
Kim, Ki-Il ;
Anwar, Sajid .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (02)
[4]  
Arjovsky M., 2017, Towards Principled Methods for Training Generative Adversarial Networks
[5]  
Arjovsky M, 2017, PR MACH LEARN RES, V70
[6]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95
[7]   Supervised principal component analysis: Visualization, classification and regression on subspaces and submanifolds [J].
Barshan, Elnaz ;
Ghodsi, Ali ;
Azimifar, Zohreh ;
Jahromi, Mansoor Zolghadri .
PATTERN RECOGNITION, 2011, 44 (07) :1357-1371
[8]  
Bazrafshan Z, 2013, 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), P113, DOI 10.1109/IKT.2013.6620049
[9]  
Beek C., 2018, McAfee threats report: December 2018, P3
[10]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)