Effective malware detection scheme based on classified behavior graph in IIoT

被引:0
|
作者
Sun, Yi [1 ,2 ]
Bashir, Ali Kashif [3 ,4 ]
Tariq, Usman [5 ]
Xiao, Fei [6 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Pilot Software Engn Sch, Sch Comp Sci, Beijing, Peoples R China
[2] Natl Engn Lab Mobile Network Technol, Beijing, Peoples R China
[3] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[4] Natl Univ Sci & Technol Islamabad NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad, Pakistan
[5] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[6] Ding Xuan Cryptog Testing CO LTD, Shenzhen, Peoples R China
关键词
IIoT; Security and privacy; Malware detection; Classified behavior graph;
D O I
10.1016/j.adhoc.2021.102558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Industrial Internet of Things(IIoT), secure transferring, computing and processing data are critical in developing automated environments, such as smart factories, smart airports and smart healthcare systems for high quality service. Therefore, how to make full use of the massive industrial data in IIoT while preventing malware intrusion and leaking out no privacy is a leading and promising work. In this paper, we focus on the research of malware detection and propose an architecture of a classified behavior graph-based intelligent detection model for malware attacks, which can not only avoid the high cost in graph matching but also achieve high malware detection accuracy. Experiments on the malware families Delf, Obfuscated, Small and Zlob, each malware family containing 880 samples, show that the highest accuracy TPR can reach up to 99.9%.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Effective malware detection scheme based on classified behavior graph in IIoT
    Sun, Yi
    Bashir, Ali Kashif
    Tariq, Usman
    Xiao, Fei
    [J]. Ad Hoc Networks, 2021, 120
  • [2] An unknown malware detection scheme based on the features of graph
    Zhao, Zongqu
    Wang, Junfeng
    Wang, Chonggang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 239 - 246
  • [3] A malware detection method based on family behavior graph
    Ding, Yuxin
    Xia, Xiaoling
    Chen, Sheng
    Li, Ye
    [J]. COMPUTERS & SECURITY, 2018, 73 : 73 - 86
  • [4] Convnext-Eesnn: An effective deep learning based malware detection in edge based IIOT
    Maddali, Deepika
    [J]. Journal of Intelligent and Fuzzy Systems, 2024, 46 (04): : 10405 - 10421
  • [5] WHGDroid: Effective android malware detection based on weighted heterogeneous graph
    Huang, Lu
    Xue, Jingfeng
    Wang, Yong
    Liu, Zhenyan
    Chen, Junbao
    Kong, Zixiao
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [6] An effective behavior-based Android malware detection system
    Zou, Shihong
    Zhang, Jing
    Lin, Xiaodong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (12) : 2079 - 2089
  • [7] Malware Detection based on Graph Classification
    Khanh-Huu-The Dam
    Touili, Tayssir
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 455 - 463
  • [8] Edge-Based IIoT Malware Detection for Mobile Devices With Offloading
    Deng, Xiaoheng
    Pei, Xinjun
    Tian, Shengwei
    Zhang, Lan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (07) : 8093 - 8103
  • [9] Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection
    Wuchner, Tobias
    Cislak, Aleksander
    Ochoa, Martin
    Pretschner, Alexander
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 99 - 112
  • [10] Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network
    Zheng, Rui
    Wang, Qiuyun
    He, Jia
    Fu, Jianming
    Suri, Guga
    Jiang, Zhengwei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022