A multiview learning method for malware threat hunting: windows, IoT and android as case studies

被引:0
|
作者
Hamid Darabian
Ali Dehghantanha
Sattar Hashemi
Mohammad Taheri
Amin Azmoodeh
Sajad Homayoun
Kim-Kwang Raymond Choo
Reza M. Parizi
机构
[1] Shiraz University,Department of Computer Science and Engineering
[2] University of Guelph,Cyber Science Lab, School of Computer Science
[3] Shiraz University of Technology,IT and Computer Engineering Faculty
[4] The University of Texas at San Antonio,Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering
[5] Kennesaw State University,Department of Software Engineering and Game Development
来源
World Wide Web | 2020年 / 23卷
关键词
Malware; Threat hunting; Malware detection; Multi-view learning; Maximum margin; View weighting;
D O I
暂无
中图分类号
学科分类号
摘要
Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes, and API calls, to distinguish malware from goodware. However, existing malware hunting approaches generally focus on a single particular view, such as using dynamic information or opcodes only. While single-view malware hunting systems may provide lean and optimized basis for detecting a specific type of malware, their performance can be significantly limited when dealing with other types of malware; thus, making it trivial for an advanced attacker to develop malware that simply obfuscates features monitored by a single-view malware detection system. To address these limitations, we propose a multi-view learning method that uses multiple views including OpCodes, ByteCodes, header information, permission, attacker’s intent and API call to hunt malicious programs. Our system automatically assigns weights to different views to optimize detection in different environment. Using experiments conducted on various Windows, Android and Internet of Things (IoT) platforms, we demonstrate that our method offers high accuracy with a low false positive rate on these case study platforms. Moreover, we also investigate the robustness of detection against weak views (features with low power of discrimination). The proposed method is the first malware threat hunting method that can be applied to different platforms, at the time of this research, and it is considerably difficult for attackers to evade detection (since it requires attackers to obfuscate multiple different views).
引用
下载
收藏
页码:1241 / 1260
页数:19
相关论文
共 48 条
  • [21] Blockchain and Deep Learning for Cyber Threat-Hunting in Software-Defined Industrial IoT
    Kumar, Randhir
    Kumar, Prabhat
    Kumar, Abhinav
    Franklin, A. Antony
    Jolfaei, Alireza
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 776 - 781
  • [22] An Android Behavior-Based Malware Detection Method using Machine Learning
    Chang, Wei-Ling
    Sun, Hung-Min
    Wu, Wei
    2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2016,
  • [23] MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports
    Vanjire, Seema Sachin
    Lakshmi, M.
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 147 - 159
  • [24] An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems
    Jahromi, Amir Namavar
    Hashemi, Sattar
    Dehghantanha, Ali
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (05): : 630 - 640
  • [25] Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques
    Li, Shudong
    Zhang, Qianqing
    Wu, Xiaobo
    Han, Weihong
    Tian, Zhihong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] A new machine learning-based method for android malware detection on imbalanced dataset
    Dehkordy, Diyana Tehrany
    Rasoolzadegan, Abbas
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) : 24533 - 24554
  • [27] Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
    Demontis, Ambra
    Melis, Marco
    Biggio, Battista
    Maiorca, Davide
    Arp, Daniel
    Rieck, Konrad
    Corona, Igino
    Giacinto, Giorgio
    Roli, Fabio
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 711 - 724
  • [28] SeGDroid: An Android malware detection method based on sensitive function call graph learning
    Liu, Zhen
    Wang, Ruoyu
    Japkowicz, Nathalie
    Gomes, Heitor Murilo
    Peng, Bitao
    Zhang, Wenbin
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 235
  • [29] A new machine learning-based method for android malware detection on imbalanced dataset
    Diyana Tehrany Dehkordy
    Abbas Rasoolzadegan
    Multimedia Tools and Applications, 2021, 80 : 24533 - 24554
  • [30] Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware
    Yonamine, Shun
    Taenaka, Yuzo
    Kadobayashi, Youki
    Miyamoto, Daisuke
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (02) : 149 - 163