Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing

被引:7
作者
Lu, Huabiao [1 ]
Zhao, Baokang [1 ]
Su, Jinshu [1 ]
Xie, Peidai [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha, Hunan, Peoples R China
关键词
People-centric sensing; Malware detection; Lightweight behavioral signature; Syscall sequences;
D O I
10.1007/s11277-013-1400-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
People-centric sensing (PCS) is an emerging paradigm of sensor network which turns daily used mobile devices (such as smartphones and PDAs) to sensors. It is promising but faces severe security problems. As smartphones are already and will keep up to be attractive targets to attackers, even more, with strong connectivity and homogeneous applications, all mobile devices in PCS will risk being infected by malware more rapidly. Even worse, attackers usually obfuscate their malwares in order to avoid simple (syntactic signature based) detection. Thus, more intelligent (behavioral signature based) detection is needed. But in the field of network security, the state-of-the-art behavioral signature-behavior graph-is too complicated to be used in mobile devices. This paper proposes a novel behavioral signature generation system-SimBehavior-to generate lightweight behavioral signature for malware detection in PCS. Generated lightweight behavioral signature is a bit like regex (regular expression) rules. And thus, unlike malware detection using behavior graph is NP-Complete, using our lightweight behavioral signature is efficient and very suitable for malware detection in PCS. Our experimental results show that SimBehavior can extract behavioral signatures effectively, and generated lightweight behavioral signatures can be used to detect new malware samples in PCS efficiently and effectively.
引用
收藏
页码:1591 / 1609
页数:19
相关论文
共 24 条
[1]  
[Anonymous], P 6 JOINT M EUR SOFT
[2]  
[Anonymous], 1 WORKSH SEC PRIV SM
[3]  
[Anonymous], P 1996 IEEE S SEC PR
[4]  
[Anonymous], 2013, INT SEC THREAT REP 2, V18
[5]  
Bayer Ulrich, 2009, 2 USENIX WORKSH LARG
[6]  
Clemens K., 2009, USENIX SEC 09
[7]  
Dreger H., 2005, 15 USENIX SEC S
[8]  
Fredrikson M., 2010, P 2010 IEEE S SEC PR
[9]  
Fredrikson M, 2011, LECT NOTES ARTIF INT, V6803, P252, DOI 10.1007/978-3-642-22438-6_20
[10]  
Hoglund G., 2005, ROOTKITS SUBVERTING