vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment

被引:1
|
作者
Gaur, Avantika [1 ]
Mishra, Preeti [1 ]
Vinod, P. [2 ]
Singh, Arjun [1 ]
Varadharajan, Vijay [3 ]
Tupakula, Uday [3 ]
Conti, Mauro [2 ]
机构
[1] Doon Univ, Sch Biol Sci, Dehra Dun 248012, Uttaranchal, India
[2] Univ Padua, Dept Math, Padua, Italy
[3] Univ Newcastle, Adv Cyber Secur Engn Res Ctr ACSRC, Callaghan, Australia
关键词
Malware detection; Virtualization; Hypervisor; Xen; XAI; Malware analysis; Out-VM monitoring;
D O I
10.1016/j.compeleceng.2024.109742
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Virtualization can be defined as the backbone of cloud computing services, which has gathered significant attention from organizations and users. Due to the increasing number of cyberattacks, virtualization security has become a crucial area of study. In this paper, we propose an explainable and introspection-based malware detection approach called vDefender for finegrain monitoring of virtual machine (VM) processes at the hypervisor to identify the malicious behaviour of 17 different malware families of Windows exhibiting new evolving behaviour. Initially, it performs a basic security check to detect hidden processes and ensures the presence of security-critical processes. Then, deep memory introspection is performed using a software breakpoints injection approach to intercept the execution of processes. Various process activity logs are captured that include process-related, file manipulation, kernel heap object creation, exception-related activities, etc. Hybrid feature vectors are derived from these logs, which are reconstructed using the proposed mechanism to eliminate the redundant behaviour. The features are then learnt using Random Forest (RF) algorithm to classify distinct malware families. The interpretation and analysis of RF results involve the use of explainability techniques. The proposed approach achieves an accuracy of 95.49%, F1-score of 95.82% with 0.05% false alarms when evaluated using an emerging malware dataset. The contribution includes a comprehensive discussion of results, accompanied by a comparative analysis of current approaches that gives readers insight towards future research directions.
引用
收藏
页数:23
相关论文
empty
未找到相关数据