A multiview learning method for malware threat hunting: windows, IoT and android as case studies

被引:0
作者
Hamid Darabian
Ali Dehghantanha
Sattar Hashemi
Mohammad Taheri
Amin Azmoodeh
Sajad Homayoun
Kim-Kwang Raymond Choo
Reza M. Parizi
机构
[1] Shiraz University,Department of Computer Science and Engineering
[2] University of Guelph,Cyber Science Lab, School of Computer Science
[3] Shiraz University of Technology,IT and Computer Engineering Faculty
[4] The University of Texas at San Antonio,Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering
[5] Kennesaw State University,Department of Software Engineering and Game Development
来源
World Wide Web | 2020年 / 23卷
关键词
Malware; Threat hunting; Malware detection; Multi-view learning; Maximum margin; View weighting;
D O I
暂无
中图分类号
学科分类号
摘要
Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes, and API calls, to distinguish malware from goodware. However, existing malware hunting approaches generally focus on a single particular view, such as using dynamic information or opcodes only. While single-view malware hunting systems may provide lean and optimized basis for detecting a specific type of malware, their performance can be significantly limited when dealing with other types of malware; thus, making it trivial for an advanced attacker to develop malware that simply obfuscates features monitored by a single-view malware detection system. To address these limitations, we propose a multi-view learning method that uses multiple views including OpCodes, ByteCodes, header information, permission, attacker’s intent and API call to hunt malicious programs. Our system automatically assigns weights to different views to optimize detection in different environment. Using experiments conducted on various Windows, Android and Internet of Things (IoT) platforms, we demonstrate that our method offers high accuracy with a low false positive rate on these case study platforms. Moreover, we also investigate the robustness of detection against weak views (features with low power of discrimination). The proposed method is the first malware threat hunting method that can be applied to different platforms, at the time of this research, and it is considerably difficult for attackers to evade detection (since it requires attackers to obfuscate multiple different views).
引用
收藏
页码:1241 / 1260
页数:19
相关论文
共 67 条
  • [1] Bai J(2016)Improving malware detection using multi-view ensemble learning Secur. Commun. Netw. 9 4227-4241
  • [2] Wang J(2015)Research-paper recommender systems: a literature survey Int. J. Digital Libraries 17 305-338
  • [3] Beel J(2018)A deep recurrent neural network based approach for internet of things malware threat hunting Futur. Gener. Comput. Syst. 85 88-96
  • [4] Gipp B(1998)Support vector machines IEEE Int. Sys. Appl. 13 18-28
  • [5] Langer S(2011)Large-margin nearest neighbor classifiers via sample weight learning Neurocomputing 74 656-660
  • [6] Breitinger C(2017)Pindroid: a novel android malware detection system using ensemble learning methods Comput. Secur. 68 36-46
  • [7] HaddadPajouh H(2019)Towards adversarial malware detection: lessons learned from pdf-based attacks ACM Computing Surveys (CSUR) 52 78-1274
  • [8] Dehghantanha A(2018)A multi-view context-aware approach to android malware detection and malicious code localization Empir. Softw. Eng. 23 1222-327
  • [9] Khayami R(2019)Android fragmentation in malware detection Comput. Secur. 87 101573-39
  • [10] Choo KKR(2018)Evolution of ransomware IET Netw. 7 321-102