Effective malware detection scheme based on classified behavior graph in IIoT

被引:0
|
作者
Sun, Yi [1 ,2 ]
Bashir, Ali Kashif [3 ,4 ]
Tariq, Usman [5 ]
Xiao, Fei [6 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Pilot Software Engn Sch, Sch Comp Sci, Beijing, Peoples R China
[2] Natl Engn Lab Mobile Network Technol, Beijing, Peoples R China
[3] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[4] Natl Univ Sci & Technol Islamabad NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad, Pakistan
[5] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[6] Ding Xuan Cryptog Testing CO LTD, Shenzhen, Peoples R China
关键词
IIoT; Security and privacy; Malware detection; Classified behavior graph;
D O I
10.1016/j.adhoc.2021.102558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Industrial Internet of Things(IIoT), secure transferring, computing and processing data are critical in developing automated environments, such as smart factories, smart airports and smart healthcare systems for high quality service. Therefore, how to make full use of the massive industrial data in IIoT while preventing malware intrusion and leaking out no privacy is a leading and promising work. In this paper, we focus on the research of malware detection and propose an architecture of a classified behavior graph-based intelligent detection model for malware attacks, which can not only avoid the high cost in graph matching but also achieve high malware detection accuracy. Experiments on the malware families Delf, Obfuscated, Small and Zlob, each malware family containing 880 samples, show that the highest accuracy TPR can reach up to 99.9%.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] A Malware Detection Scheme Based on Mining Format Information
    Bai, Jinrong
    Wang, Junfeng
    Zou, Guozhong
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [22] A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION
    Mosli, Rayan
    Li, Rui
    Yuan, Bo
    Pan, Yin
    [J]. ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 187 - 201
  • [23] Lightweight Behavior-Based Malware Detection
    Anisetti, Marco
    Ardagna, Claudio A.
    Bena, Nicola
    Giandomenico, Vincenzo
    Gianini, Gabriele
    [J]. MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 237 - 250
  • [24] An Effective Framework of Behavior Detection-Advanced Static Analysis for Malware Detection
    Louk, Maya
    Lim, Hyotaek
    Lee, HoonJae
    Atiquzzaman, Mohammed
    [J]. 2014 14th International Symposium on Communications and Information Technologies (ISCIT), 2014, : 361 - 365
  • [25] Behavior-based malware analysis and detection
    Liu, Wu
    Ren, Ping
    Liu, Ke
    Duan, Hai-Xin
    [J]. Proceedings - 2011 1st International Workshop on Complexity and Data Mining, IWCDM 2011, 2011, : 39 - 42
  • [26] Malytics: A Malware Detection Scheme
    Yousefi-Azar, Mahmood
    Hamey, Leonard G. C.
    Varadharajan, Vijay
    Chen, Sniping
    [J]. IEEE ACCESS, 2018, 6 : 49418 - 49431
  • [27] Malware Detection Based on Suspicious Behavior Identification
    Wang, Cheng
    Pang, Jianmin
    Zhao, Rongcai
    Fu, Wen
    Liu, Xiaoxian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 198 - 202
  • [28] Collaborative Learning Based Effective Malware Detection System
    Singh, Narendra
    Kasyap, Harsh
    Tripathy, Somanath
    [J]. ECML PKDD 2020 WORKSHOPS, 2020, 1323 : 205 - 219
  • [29] A malware detection model based on imbalanced heterogeneous graph embeddings
    Li, Tun
    Luo, Ya
    Wan, Xin
    Li, Qian
    Liu, Qilie
    Wang, Rong
    Jia, Chaolong
    Xiao, Yunpeng
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 246
  • [30] Spectral-Based Directed Graph Network for Malware Detection
    Zhang, Zikai
    Li, Yidong
    Dong, Hairong
    Gao, Honghao
    Jin, Yi
    Wang, Wei
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 957 - 970