Malware Classification using Deep Neural Networks: Performance
Evaluation and Applications in Edge Devices
- URL: http://arxiv.org/abs/2310.06841v1
- Date: Mon, 21 Aug 2023 16:34:46 GMT
- Title: Malware Classification using Deep Neural Networks: Performance
Evaluation and Applications in Edge Devices
- Authors: Akhil M R, Adithya Krishna V Sharma, Harivardhan Swamy, Pavan A,
Ashray Shetty, Anirudh B Sathyanarayana
- Abstract summary: Multiple Deep Neural Networks (DNNs) can be designed to detect and classify malware binaries.
The feasibility of deploying these DNN models on edge devices to enable real-time classification, particularly in resource-constrained scenarios proves to be integral to large IoT systems.
This study contributes to advancing malware detection techniques and emphasizes the significance of integrating cybersecurity measures for the early detection of malware.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: With the increasing extent of malware attacks in the present day along with
the difficulty in detecting modern malware, it is necessary to evaluate the
effectiveness and performance of Deep Neural Networks (DNNs) for malware
classification. Multiple DNN architectures can be designed and trained to
detect and classify malware binaries. Results demonstrate the potential of DNNs
in accurately classifying malware with high accuracy rates observed across
different malware types. Additionally, the feasibility of deploying these DNN
models on edge devices to enable real-time classification, particularly in
resource-constrained scenarios proves to be integral to large IoT systems. By
optimizing model architectures and leveraging edge computing capabilities, the
proposed methodologies achieve efficient performance even with limited
resources. This study contributes to advancing malware detection techniques and
emphasizes the significance of integrating cybersecurity measures for the early
detection of malware and further preventing the adverse effects caused by such
attacks. Optimal considerations regarding the distribution of security tasks to
edge devices are addressed to ensure that the integrity and availability of
large scale IoT systems are not compromised due to malware attacks, advocating
for a more resilient and secure digital ecosystem.
Related papers
- MDHP-Net: Detecting Injection Attacks on In-vehicle Network using Multi-Dimensional Hawkes Process and Temporal Model [44.356505647053716]
In this paper, we consider a specific type of cyberattack known as the injection attack.
These injection attacks have effect over time, gradually manipulating network traffic and disrupting the vehicle's normal functioning.
We propose an injection attack detector, MDHP-Net, which integrates optimal MDHP parameters with MDHP-LSTM blocks to enhance temporal feature extraction.
arXiv Detail & Related papers (2024-11-15T15:05:01Z) - Empowering Malware Detection Efficiency within Processing-in-Memory Architecture [0.7910057416898179]
Malware detection techniques leveraging Machine Learning have gained popularity.
One major drawback of neural network architectures is their substantial computational resource requirements.
We propose a Processing-in-Memory (PIM)-based architecture to mitigate memory access latency.
arXiv Detail & Related papers (2024-04-12T21:28:43Z) - Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware Distributed Computing for Enhanced Security [0.6856683556201506]
Malicious applications, commonly known as malware, pose a significant threat to IoT devices and networks.
We present a novel resource- and workload-aware malware detection framework integrated with distributed computing for IoT networks.
arXiv Detail & Related papers (2024-04-12T21:11:29Z) - Enhancing IoT Malware Detection through Adaptive Model Parallelism and Resource Optimization [0.6856683556201506]
This study introduces a novel approach to malware detection tailored for IoT devices.
Based on resource availability, ongoing workload, and communication costs, the malware detection task is dynamically allocated either on-device or offloaded to neighboring IoT nodes.
Experimental results demonstrate that this proposed technique achieves a significant speedup of 9.8 x compared to on-device inference.
arXiv Detail & Related papers (2024-04-12T20:51:25Z) - Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets [5.198311758274061]
We present a novel verification domain that will help to ensure tangible safeguards against adversaries.
We describe malware classification and two types of common malware datasets.
We outline the challenges and future considerations necessary for the improvement and refinement of the verification of malware classification.
arXiv Detail & Related papers (2024-04-08T17:37:22Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - A survey on hardware-based malware detection approaches [45.24207460381396]
Hardware-based malware detection approaches leverage hardware performance counters and machine learning prowess.
We meticulously analyze the approach, unraveling the most common methods, algorithms, tools, and datasets that shape its contours.
The discussion extends to crafting mixed hardware and software approaches for collaborative efficacy, essential enhancements in hardware monitoring units, and a better understanding of the correlation between hardware events and malware applications.
arXiv Detail & Related papers (2023-03-22T13:00:41Z) - DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified
Robustness [58.23214712926585]
We develop a certified defense, DRSM (De-Randomized Smoothed MalConv), by redesigning the de-randomized smoothing technique for the domain of malware detection.
Specifically, we propose a window ablation scheme to provably limit the impact of adversarial bytes while maximally preserving local structures of the executables.
We are the first to offer certified robustness in the realm of static detection of malware executables.
arXiv Detail & Related papers (2023-03-20T17:25:22Z) - RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for low latency
IoT systems [41.1371349978643]
We present an approach that targets the security of collaborative deep inference via re-thinking the distribution strategy.
We formulate this methodology, as an optimization, where we establish a trade-off between the latency of co-inference and the privacy-level of data.
arXiv Detail & Related papers (2022-08-27T14:50:00Z) - A Review of Confidentiality Threats Against Embedded Neural Network
Models [0.0]
This review focuses on attacks targeting the confidentiality of embedded Deep Neural Network (DNN) models.
We highlight the fact that Side-Channel Analysis (SCA) is a relatively unexplored bias by which model's confidentiality can be compromised.
arXiv Detail & Related papers (2021-05-04T10:27:20Z) - Increasing the Confidence of Deep Neural Networks by Coverage Analysis [71.57324258813674]
This paper presents a lightweight monitoring architecture based on coverage paradigms to enhance the model against different unsafe inputs.
Experimental results show that the proposed approach is effective in detecting both powerful adversarial examples and out-of-distribution inputs.
arXiv Detail & Related papers (2021-01-28T16:38:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.