A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution

被引:54
作者
Dib, Mirabelle [1 ]
Torabi, Sadegh [1 ]
Bou-Harb, Elias [2 ]
Assi, Chadi [1 ]
机构
[1] Concordia Inst Informat Syst Engn, Cyber Secur Res Ctr, Montreal, PQ H3G 1M8, Canada
[2] Univ Texas San Antonio, Cyber Ctr Secur & Analyt, San Antonio, TX 78249 USA
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 02期
基金
加拿大自然科学与工程研究理事会; 美国国家科学基金会;
关键词
Malware; Feature extraction; Internet of Things; Deep learning; Labeling; Security; Tsunami; IoT malware classification; deep learning; multimodal learning; feature fusion; static malware analysis;
D O I
10.1109/TNSM.2021.3075315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of Internet of Things malware, which leverages exploited IoT devices to perform large-scale cyber attacks (e.g., Mirai botnet), is considered as a major threat to the Internet ecosystem. To mitigate such threat, there is an utmost need for effective IoT malware classification and family attribution, which provide essential steps towards initiating attack mitigation/prevention countermeasures. In this paper, motivated by the lack of sophisticated malware obfuscation in the implementation of IoT malware, we utilize features extracted from strings- and image-based representations of the executable binaries to propose a novel multi-dimensional classification approach using Deep Learning (DL) architectures. To this end, we analyze more than 70,000 recently detected IoT malware samples. Our in-depth experiments with four prominent IoT malware families highlight the significant accuracy of the approach (99.78%), which outperforms conventional single-level classifiers. Additionally, we utilize our IoT-tailored approach for labeling newly detected "unknown" malware samples, which were mainly attributed to a few predominant families. Finally, this work contributes to the security of future networks (e.g., 5G) through the implementation of effective tools/techniques for timely IoT malware classification, and attack mitigation.
引用
收藏
页码:1165 / 1177
页数:13
相关论文
共 44 条
[1]  
Agarap A.F., 2018, THE J
[2]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[3]   Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers [J].
Alasmary, Hisham ;
Abusnaina, Ahmed ;
Jang, Rhongho ;
Abuhamad, Mohammed ;
Anwar, Afsah ;
Nyang, DaeHun ;
Mohaisen, David .
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, :888-898
[4]  
Alhanahnah M, 2018, IEEE CONF COMM NETW
[5]  
[Anonymous], 2018, HAJIME BOTNET MAKES
[6]  
[Anonymous], 2012, Official Gazette of Republic of Serbia
[7]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]  
Bendiab G, 2020, PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, P444, DOI 10.1109/NetSoft48620.2020.9165381
[9]   L(a)ying in (Test)Bed How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification [J].
Beppler, Tamy ;
Botacin, Marcus ;
Ceschin, Fabricio J. O. ;
Oliveira, Luiz E. S. ;
Gregio, Andre .
INFORMATION SECURITY, ISC 2019, 2019, 11723 :381-401
[10]  
Brosch T., 2006, RUNTIME PACKERS HIDD