Effective malware detection scheme based on classified behavior graph in IIoT

被引:0
|
作者
Sun, Yi [1 ,2 ]
Bashir, Ali Kashif [3 ,4 ]
Tariq, Usman [5 ]
Xiao, Fei [6 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Pilot Software Engn Sch, Sch Comp Sci, Beijing, Peoples R China
[2] Natl Engn Lab Mobile Network Technol, Beijing, Peoples R China
[3] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[4] Natl Univ Sci & Technol Islamabad NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad, Pakistan
[5] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[6] Ding Xuan Cryptog Testing CO LTD, Shenzhen, Peoples R China
关键词
IIoT; Security and privacy; Malware detection; Classified behavior graph;
D O I
10.1016/j.adhoc.2021.102558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Industrial Internet of Things(IIoT), secure transferring, computing and processing data are critical in developing automated environments, such as smart factories, smart airports and smart healthcare systems for high quality service. Therefore, how to make full use of the massive industrial data in IIoT while preventing malware intrusion and leaking out no privacy is a leading and promising work. In this paper, we focus on the research of malware detection and propose an architecture of a classified behavior graph-based intelligent detection model for malware attacks, which can not only avoid the high cost in graph matching but also achieve high malware detection accuracy. Experiments on the malware families Delf, Obfuscated, Small and Zlob, each malware family containing 880 samples, show that the highest accuracy TPR can reach up to 99.9%.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Effective Malware Detection Based on Behaviour and Data Features
    Xu, Zhiwu
    Wen, Cheng
    Qin, Shengchao
    Ming, Zhong
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2017, 2018, 10699 : 53 - 66
  • [32] Clustering based opcode graph generation for malware variant detection
    Wai, Fok Kar
    Thing, Vrizlynn L. L.
    [J]. 2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [33] Structural Attack against Graph Based Android Malware Detection
    Zhao, Kaifa
    Zhou, Hao
    Zhu, Yulin
    Zhan, Xian
    Zhou, Kai
    Li, Jianfeng
    Yu, Le
    Yuan, Wei
    Luo, Xiapu
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3218 - 3235
  • [34] Interpretable Automatic Detection of Android Malware Based on Graph Embedding
    Wang, Yulian
    Lu, Mingming
    [J]. Computer Engineering and Applications, 2024, 57 (23) : 122 - 128
  • [35] Graph-based malware detection using dynamic analysis
    Anderson, Blake
    Quist, Daniel
    Neil, Joshua
    Storlie, Curtis
    Lane, Terran
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 247 - 258
  • [36] Graph-Based Malware Detection Using Opcode Sequences
    Gulmez, Sibel
    Sogukpinar, Ibrahim
    [J]. 9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [37] Distributed IIoT Anomaly Detection Scheme Based on Blockchain and Federated Learning
    Jin, Xiaojun
    Ma, Chao
    Luo, Song
    Zeng, Pengyi
    Wei, Yifei
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2024, 26 (02) : 252 - 262
  • [38] A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic
    Liu, Anran
    Chen, Zhenxiang
    Wang, Shanshan
    Peng, Lizhi
    Zhao, Chuan
    Shi, Yuliang
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 109 - 120
  • [39] Deep learning for effective Android malware detection using API call graph embeddings
    Abdurrahman Pektaş
    Tankut Acarman
    [J]. Soft Computing, 2020, 24 : 1027 - 1043
  • [40] Deep learning for effective Android malware detection using API call graph embeddings
    Pektas, Abdurrahman
    Acarman, Tankut
    [J]. SOFT COMPUTING, 2020, 24 (02) : 1027 - 1043