Effective malware detection scheme based on classified behavior graph in IIoT

被引:0
|
作者
Sun, Yi [1 ,2 ]
Bashir, Ali Kashif [3 ,4 ]
Tariq, Usman [5 ]
Xiao, Fei [6 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Pilot Software Engn Sch, Sch Comp Sci, Beijing, Peoples R China
[2] Natl Engn Lab Mobile Network Technol, Beijing, Peoples R China
[3] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[4] Natl Univ Sci & Technol Islamabad NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad, Pakistan
[5] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[6] Ding Xuan Cryptog Testing CO LTD, Shenzhen, Peoples R China
关键词
IIoT; Security and privacy; Malware detection; Classified behavior graph;
D O I
10.1016/j.adhoc.2021.102558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Industrial Internet of Things(IIoT), secure transferring, computing and processing data are critical in developing automated environments, such as smart factories, smart airports and smart healthcare systems for high quality service. Therefore, how to make full use of the massive industrial data in IIoT while preventing malware intrusion and leaking out no privacy is a leading and promising work. In this paper, we focus on the research of malware detection and propose an architecture of a classified behavior graph-based intelligent detection model for malware attacks, which can not only avoid the high cost in graph matching but also achieve high malware detection accuracy. Experiments on the malware families Delf, Obfuscated, Small and Zlob, each malware family containing 880 samples, show that the highest accuracy TPR can reach up to 99.9%.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio
    Osuge, Kyohei
    Kato, Hiroya
    Haruta, Shuichiro
    Sasase, Iwao
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (06) : 1136 - 1144
  • [42] An Effective Online Scheme for Detecting Android Malware
    Liang, Shuang
    Du, Xiaojiang
    Tan, Chiu C.
    Yu, Wei
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [43] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    [J]. Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [44] Malware Detection Based on Deep Learning of Behavior Graphs
    Xiao, Fei
    Lin, Zhaowen
    Sun, Yi
    Ma, Yan
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019
  • [45] A Study on The behavior-based Malware Detection Signature
    Oh, Sungtaek
    Go, Woong
    Lee, Taejin
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 663 - 670
  • [46] Behavior-Based Malware Detection on Mobile Phone
    Dai, Shuaifu
    Liu, Yaxin
    Wang, Tielei
    Wei, Tao
    Zou, Wei
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [47] A fast malware detection model based on heterogeneous graph similarity search
    Li, Tun
    Shou, Peng
    Wan, Xin
    Li, Qian
    Wang, Rong
    Jia, Chaolong
    Xiao, Yunpeng
    [J]. COMPUTER NETWORKS, 2024, 254
  • [48] DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding
    Song, Qige
    Zhang, Yongzheng
    Yao, Junliang
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 802 - 809
  • [49] Intelligent Anomaly Detection System through Malware Image Augmentation in IIoT Environment Based on Digital Twin
    Cha, Hyun-Jong
    Yang, Ho-Kyung
    Song, You-Jin
    Kang, Ah Reum
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (18):
  • [50] On Behavior-based Detection of Malware on Android Platform
    Yu, Wei
    Zhang, Hanlin
    Ge, Linqiang
    Hardy, Rommie
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 814 - 819