Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model

被引:4
作者
Hu, Xiaohui [1 ]
Sun, Rui [1 ]
Xu, Kejia [1 ]
Zhang, Yongzheng [1 ]
Chang, Peng [1 ]
机构
[1] Chinese Acad Sci, Univ Chinese Acad Sci, Sch Cyber Secur, Inst Informat Engn, Beijing, Peoples R China
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
关键词
IoT; Malware detection; Hierarchical Transformer;
D O I
10.1109/TrustCom50675.2020.00124
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The number of IoT devices continues to increase, but the security of IoT devices cannot be guaranteed. Many IoT devices are infected with malware, forming huge botnets, which could launch DDoS attacks and cause heavy losses. In recent years, the IoT malware family has a tendency to be centralized on ARM-based IoT devices. The most widely spread families are the Mirai family and Gafgyt family. In this paper, we automatically extract the instruction sequences of these two families' samples and use the instruction sequences as language to describe these samples. We transfer instruction sequences to word vector space by Word2Vec. Then exploiting internal hierarchical structure of functions in malware to construct a hierarchical language model based on transformer-encoder to classify the samples. And the results obtained after visualizing the weights of the model can reflect the correlation of the functions in the sample, which can help the sample analyst find the key function. We use IoT software samples including Mirai samples, Gafgyt samples and benign samples to train our model. In the experiments, our model achieves 99.12% recall rate of malware and 94.67% family classification accuracy rate, which is better than other methods.
引用
收藏
页码:928 / 935
页数:8
相关论文
共 32 条
  • [21] Nataraj L., 2011, P 8 INT S VIS CYB SE, P1
  • [22] Nataraj L, 2011, P 4 ACM WORKSH SEC A, P21, DOI DOI 10.1145/2046684.2046689
  • [23] Pa Yin Minn Pa, 2016, J INF PROCESS, V24, P522, DOI DOI 10.2197/IPSJJIP.24.522
  • [24] Popov I, 2017, 2017 SIBERIAN SYMPOSIUM ON DATA SCIENCE AND ENGINEERING (SSDSE), P1, DOI 10.1109/SSDSE.2017.8071952
  • [25] Salehi Z, 2014, COMPUT FRAUD SECUR, P9, DOI 10.1016/S1361-3723(14)70531-7
  • [26] Santos I, 2009, ICEIS 2009 : PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS, P317
  • [27] Saxe J, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P11, DOI 10.1109/MALWARE.2015.7413680
  • [28] Data mining methods for detection of new malicious executables
    Schultz, MG
    Eskin, E
    Zadok, E
    Stolfo, SJ
    [J]. 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 38 - 49
  • [29] Shanhu Shang, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P113, DOI 10.1109/MALWARE.2010.5665787
  • [30] Spognardi A., 2017, ANAL DDOS CAPABLE IO, P807