Lightweight IoT Malware Visualization Analysis via Two-Bits Networks

被引:1
作者
Wen, Hui [1 ,2 ]
Zhang, Weidong [1 ,2 ]
Hu, Yan [4 ]
Hu, Qing [3 ]
Zhu, Hongsong [1 ,2 ]
Sun, Limin [1 ,2 ]
机构
[1] Chinese Acad Sci, Beijing Key Lab IOT Informat Secur Technol, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
[3] Beijing Inst Technol, Sch Aerosp Engn, Beijing, Peoples R China
[4] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019 | 2019年 / 11604卷
基金
中国国家自然科学基金; 国家重点研发计划; 中国博士后科学基金;
关键词
Internet of Things; Malware detection; Lightweight analysis; Two-bits convolutional neural network;
D O I
10.1007/978-3-030-23597-0_51
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) devices are typically resource constrained micro-computers for domain-specific computations. Most of them use low-cost embedded system that lacked basic security monitoring and protection mechanisms. Consequently, IoT-specific malwares are made to target at these vulnerable devices for deep infection and utilization, such as Mirai and Brickerbot, which poses tremendous threats to the security of IoT. In this issue, we present a novel approach for detecting malware in IoT environments. The proposed method firstly extract one-channel gray-scale image sequence that converted from the disassembled malware binaries. Then we utilize a Two-Bits Convolutional Neural Network (TBN) for detecting IoT malware families, which can encode the network edge weights with two bits. Experimental results conducted on the collected dataset show that our approach can reduce the memory usage and improve computational efficiency significantly while achieving a considerable performance in terms of malware detection accuracy.
引用
收藏
页码:613 / 621
页数:9
相关论文
共 11 条
  • [1] Ahmadi M., 2016, ACM C DAT APPL SEC P
  • [2] Anderson B., 2014, AUTOMATING REVERSE E
  • [3] [Anonymous], 2017, Imbalanced Malware Images Classification: a CNN based Approach
  • [4] Kirat D., 2013, COMP SEC APPL C 2007
  • [5] Liu L., 2017, INT C SYST INF
  • [6] Moser A., 2007, P IEEE S SEC PRIV OA
  • [7] Nataraj L., 2011, P 8 INT S VISUALIZAT, P1, DOI [10.1145/2016904.2016908, DOI 10.1145/2016904.2016908]
  • [8] Nataraj L., 2011, ACM WORKSH SEC ART I
  • [9] Raff E., 2017, P 32 AAAI C ART INT, DOI DOI 10.48550/ARXIV.1710.09435
  • [10] Su J., 2018, Lightweight Classification of IoT Malware Based on Image Recognition