Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model

被引:4
作者
Hu, Xiaohui [1 ]
Sun, Rui [1 ]
Xu, Kejia [1 ]
Zhang, Yongzheng [1 ]
Chang, Peng [1 ]
机构
[1] Chinese Acad Sci, Univ Chinese Acad Sci, Sch Cyber Secur, Inst Informat Engn, Beijing, Peoples R China
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
关键词
IoT; Malware detection; Hierarchical Transformer;
D O I
10.1109/TrustCom50675.2020.00124
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The number of IoT devices continues to increase, but the security of IoT devices cannot be guaranteed. Many IoT devices are infected with malware, forming huge botnets, which could launch DDoS attacks and cause heavy losses. In recent years, the IoT malware family has a tendency to be centralized on ARM-based IoT devices. The most widely spread families are the Mirai family and Gafgyt family. In this paper, we automatically extract the instruction sequences of these two families' samples and use the instruction sequences as language to describe these samples. We transfer instruction sequences to word vector space by Word2Vec. Then exploiting internal hierarchical structure of functions in malware to construct a hierarchical language model based on transformer-encoder to classify the samples. And the results obtained after visualizing the weights of the model can reflect the correlation of the functions in the sample, which can help the sample analyst find the key function. We use IoT software samples including Mirai samples, Gafgyt samples and benign samples to train our model. In the experiments, our model achieves 99.12% recall rate of malware and 94.67% family classification accuracy rate, which is better than other methods.
引用
收藏
页码:928 / 935
页数:8
相关论文
共 32 条
  • [1] Ashish V., 2017, ADV NEURAL INFORM PR, DOI [10.48550/arXiv.1706.03762, DOI 10.48550/ARXIV.1706.03762]
  • [2] Bandanau D., 2014, arXiv preprint arXiv:1409. 0473
  • [3] Multi-Channel Change-Point Malware Detection
    Canzanese, Raymond
    Kam, Moshe
    Mancoridis, Spiros
    [J]. 2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, : 70 - 79
  • [4] Control Flow-Based Malware Variant Detection
    Cesare, Silvio
    Xiang, Yang
    Zhou, Wanlei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (04) : 304 - 317
  • [5] Devlin J., 2018, PREPRINT
  • [6] Dogdu E, 2018, ACMSE 18 P ACMSE 201, P1
  • [7] Elkhawas AI, 2018, 2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), P252
  • [8] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    [J]. Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [9] Guanghui Liang, 2016, International Journal of Information and Education Technology, V6, P291, DOI 10.7763/IJIET.2016.V6.702
  • [10] Han K. S., 2012, P INT C IT CONV IT C, P613, DOI [10.1007/978-94-007-2911-7_60, DOI 10.1007/978-94-007-2911-7_60]