A multiview learning method for malware threat hunting: windows, IoT and android as case studies

被引:0
|
作者
Hamid Darabian
Ali Dehghantanha
Sattar Hashemi
Mohammad Taheri
Amin Azmoodeh
Sajad Homayoun
Kim-Kwang Raymond Choo
Reza M. Parizi
机构
[1] Shiraz University,Department of Computer Science and Engineering
[2] University of Guelph,Cyber Science Lab, School of Computer Science
[3] Shiraz University of Technology,IT and Computer Engineering Faculty
[4] The University of Texas at San Antonio,Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering
[5] Kennesaw State University,Department of Software Engineering and Game Development
来源
World Wide Web | 2020年 / 23卷
关键词
Malware; Threat hunting; Malware detection; Multi-view learning; Maximum margin; View weighting;
D O I
暂无
中图分类号
学科分类号
摘要
Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes, and API calls, to distinguish malware from goodware. However, existing malware hunting approaches generally focus on a single particular view, such as using dynamic information or opcodes only. While single-view malware hunting systems may provide lean and optimized basis for detecting a specific type of malware, their performance can be significantly limited when dealing with other types of malware; thus, making it trivial for an advanced attacker to develop malware that simply obfuscates features monitored by a single-view malware detection system. To address these limitations, we propose a multi-view learning method that uses multiple views including OpCodes, ByteCodes, header information, permission, attacker’s intent and API call to hunt malicious programs. Our system automatically assigns weights to different views to optimize detection in different environment. Using experiments conducted on various Windows, Android and Internet of Things (IoT) platforms, we demonstrate that our method offers high accuracy with a low false positive rate on these case study platforms. Moreover, we also investigate the robustness of detection against weak views (features with low power of discrimination). The proposed method is the first malware threat hunting method that can be applied to different platforms, at the time of this research, and it is considerably difficult for attackers to evade detection (since it requires attackers to obfuscate multiple different views).
引用
收藏
页码:1241 / 1260
页数:19
相关论文
共 48 条
  • [31] Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware
    Shun Yonamine
    Yuzo Taenaka
    Youki Kadobayashi
    Daisuke Miyamoto
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 149 - 163
  • [32] A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms
    Ma, Zhuo
    Ge, Haoran
    Liu, Yang
    Zhao, Meng
    Ma, Jianfeng
    IEEE ACCESS, 2019, 7 : 21235 - 21245
  • [33] A Two-Layer Deep Learning Method for Android Malware Detection Using Network Traffic
    Feng, Jiayin
    Shen, Limin
    Chen, Zhen
    Wang, Yuying
    Li, Hui
    IEEE ACCESS, 2020, 8 : 125786 - 125796
  • [34] Improvement of feature set based on Apriori algorithm in Android malware classification using machine learning method
    Le Duc Thuan
    Pham Van Huong
    Hoang Van Hiep
    Nguyen Kim Khanh
    2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020), 2020, : 185 - 191
  • [35] A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques
    Guendouz, Mohamed
    Amine, Abdelmalek
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2023, 17 (01)
  • [36] Deep Image: A precious image based deep learning method for online malware detection in IoT environment
    Ghahramani, Meysam
    Taheri, Rahim
    Shojafar, Mohammad
    Javidan, Reza
    Wan, Shaohua
    INTERNET OF THINGS, 2024, 27
  • [37] Unlocking the Potential of IoT for Interactive and Collaborative Learning: Case Studies in Higher Education
    Tabuenca, Bernardo
    Leo-Ramirez, Alejandro
    Uche-Soria, Manuel
    Tovar, Edmundo
    Greller, Wolfgang
    Rodosthenous, Christos
    Mavrotheris, Efstathios
    TOWARDS A HYBRID, FLEXIBLE AND SOCIALLY ENGAGED HIGHER EDUCATION, VOL 3, ICL 2023, 2024, 901 : 435 - 446
  • [38] A method of multidimensional software aging prediction based on ensemble learning: A case of Android OS
    Nie, Yuge
    Chen, Yulei
    Jiang, Yujia
    Wu, Huayao
    Yin, Beibei
    Cai, Kai -Yuan
    INFORMATION AND SOFTWARE TECHNOLOGY, 2024, 170
  • [39] Enhancing cybersecurity against ransomware attacks using LSTM deep learning method: A case study on android devices
    Karaca, Hatice
    Tekerek, Adem
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2024,
  • [40] Integrated Method for Personal Thermal Comfort Assessment and Optimization through Users' Feedback, IoT and Machine Learning: A Case Study
    Salamone, Francesco
    Belussi, Lorenzo
    Curro, Cristian
    Danza, Ludovico
    Ghellere, Matteo
    Guazzi, Giulia
    Lenzi, Bruno
    Megale, Valentino
    Meroni, Italo
    SENSORS, 2018, 18 (05)