Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics

被引:21
作者
Bridges, Robert A. [1 ]
Jimenez, Jarilyn M. Hernandez [1 ,2 ]
Nichols, Jeffrey [1 ]
Goseva-Popstojanova, Katerina [2 ]
Prowell, Stacy [1 ]
机构
[1] Oak Ridge Natl Lab, Oak Ridge, TN 37830 USA
[2] West Virginia Univ, Morgantown, WV 26506 USA
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
关键词
D O I
10.1109/TrustCom/BigDataSE.2018.00250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an experimental design and algorithm for power-based malware detection on general-purpose computers. Our design allows programmatic collection of CPU power profiles for a fixed set of non-malicious benchmarks, first running in an uninfected state and then in an infected state with malware running along with non-malicious software. To characterize power consumption profiles, we use both simple statistical and novel, sophisticated features. We propose an unsupervised, one-class anomaly detection ensemble and compare its performance with several supervised, kernel-based SVM classifiers (trained on clean and infected profiles) in detecting previously unseen malware. The anomaly detection system exhibits perfect detection when using all features across all benchmarks, with smaller false detection rate than the supervised classifiers. This paper provides a proof of concept that power-based malware detection is feasible for general-purpose computers and presents several future research steps toward that goal.
引用
收藏
页码:1680 / 1684
页数:5
相关论文
共 28 条
[1]  
[Anonymous], 2015, 10 CISR, DOI DOI 10.1145/2746266.2746279
[2]  
[Anonymous], 2013, HEALTHTECH
[3]  
[Anonymous], P 11 ANN CYB INF SEC
[4]  
Azmoodeh A., 2017, JAIHC
[5]  
Bridges R., 2018, MALWARE DETECTION VI
[6]  
Bridges RA, 2017, IEEE INT CONF BIG DA, P1071, DOI 10.1109/BigData.2017.8258031
[7]  
Cao YH, 2004, PHYS REV E, V70, DOI 10.1103/PhysRevE.70.046217
[8]   Data smashing: uncovering lurking order in data [J].
Chattopadhyay, Ishanu ;
Lipson, Hod .
JOURNAL OF THE ROYAL SOCIETY INTERFACE, 2014, 11 (101)
[9]  
Christodorescu M, 2007, ADV INFORM SECUR, P193
[10]  
Feng X., 2005, P IPDPS