Machine learning-based malware detection for IoT devices using
control-flow data
- URL: http://arxiv.org/abs/2311.11605v1
- Date: Mon, 20 Nov 2023 08:43:09 GMT
- Title: Machine learning-based malware detection for IoT devices using
control-flow data
- Authors: Gergely Hevesi
- Abstract summary: I study the applicability of control-flow related data of executables for malware detection.
I present a malware detection method with two phases. The first phase extracts control-flow related data using static binary analysis.
The second phase classifies binary executables as either malicious or benign using a neural network model.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Embedded devices are specialised devices designed for one or only a few
purposes. They are often part of a larger system, through wired or wireless
connection. Those embedded devices that are connected to other computers or
embedded systems through the Internet are called Internet of Things (IoT for
short) devices.
With their widespread usage and their insufficient protection, these devices
are increasingly becoming the target of malware attacks. Companies often cut
corners to save manufacturing costs or misconfigure when producing these
devices. This can be lack of software updates, ports left open or security
defects by design. Although these devices may not be as powerful as a regular
computer, their large number makes them suitable candidates for botnets. Other
types of IoT devices can even cause health problems since there are even
pacemakers connected to the Internet. This means, that without sufficient
defence, even directed assaults are possible against people.
The goal of this thesis project is to provide better security for these
devices with the help of machine learning algorithms and reverse engineering
tools. Specifically, I study the applicability of control-flow related data of
executables for malware detection. I present a malware detection method with
two phases. The first phase extracts control-flow related data using static
binary analysis. The second phase classifies binary executables as either
malicious or benign using a neural network model. I train the model using a
dataset of malicious and benign ARM applications.
Related papers
- Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - MONDEO: Multistage Botnet Detection [2.259031129687683]
MONDEO is a multistage mechanism to detect DNS-based botnet malware.
It comprises four detection stages: Blacklisting/Whitelisting, Query rate analysis, DGA analysis, and Machine learning evaluation.
MONDEO was tested against several datasets to measure its efficiency and performance.
arXiv Detail & Related papers (2023-08-31T09:12:30Z) - Evil from Within: Machine Learning Backdoors through Hardware Trojans [72.99519529521919]
Backdoors pose a serious threat to machine learning, as they can compromise the integrity of security-critical systems, such as self-driving cars.
We introduce a backdoor attack that completely resides within a common hardware accelerator for machine learning.
We demonstrate the practical feasibility of our attack by implanting our hardware trojan into the Xilinx Vitis AI DPU.
arXiv Detail & Related papers (2023-04-17T16:24:48Z) - A survey on hardware-based malware detection approaches [45.24207460381396]
Hardware-based malware detection approaches leverage hardware performance counters and machine learning prowess.
We meticulously analyze the approach, unraveling the most common methods, algorithms, tools, and datasets that shape its contours.
The discussion extends to crafting mixed hardware and software approaches for collaborative efficacy, essential enhancements in hardware monitoring units, and a better understanding of the correlation between hardware events and malware applications.
arXiv Detail & Related papers (2023-03-22T13:00:41Z) - IoT Device Identification Based on Network Communication Analysis Using
Deep Learning [43.0717346071013]
The risk of attacks on an organization's network has increased due to the growing use of less secure IoT devices.
To tackle this threat and protect their networks, organizations generally implement security policies in which only white listed IoT devices are allowed on the network.
In this research, deep learning is applied to network communication for the automated identification of IoT devices permitted on the network.
arXiv Detail & Related papers (2023-03-02T13:44:58Z) - Mate! Are You Really Aware? An Explainability-Guided Testing Framework
for Robustness of Malware Detectors [49.34155921877441]
We propose an explainability-guided and model-agnostic testing framework for robustness of malware detectors.
We then use this framework to test several state-of-the-art malware detectors' abilities to detect manipulated malware.
Our findings shed light on the limitations of current malware detectors, as well as how they can be improved.
arXiv Detail & Related papers (2021-11-19T08:02:38Z) - A Survey of Machine Learning Algorithms for Detecting Malware in IoT
Firmware [0.0]
This paper employs a number of machine learning algorithms to classify IoT firmware and the best performing models are reported.
Deep learning approaches including Convolutional and Fully Connected Neural Networks are also explored.
arXiv Detail & Related papers (2021-11-03T17:55:51Z) - Malware Squid: A Novel IoT Malware Traffic Analysis Framework using
Convolutional Neural Network and Binary Visualisation [2.309914459672557]
We introduce a novel IoT malware traffic analysis approach using neural network and binary visualisation.
The prime motivation of the proposed approach is to faster detect and classify new malware (zero-day malware)
arXiv Detail & Related papers (2021-09-08T00:21:45Z) - Towards Obfuscated Malware Detection for Low Powered IoT Devices [0.11417805445492081]
IoT and edge devices have become a new threat vector for malware authors.
Due to their limited computational power and storage space, it is infeasible to deploy state-of-the-art malware detectors onto these systems.
We propose using and extracting features from Markov matrices constructed from opcode traces as a low cost feature for unobfuscated and obfuscated malware detection.
arXiv Detail & Related papers (2020-11-06T17:10:26Z) - Lightweight IoT Malware Detection Solution Using CNN Classification [2.288885651912488]
The security aspect of IoT devices is an infant field, which is why it is our focus in this paper.
We developed a system that can recognize malicious behavior of a specific IoT node on the network.
Through convolutional neural network and monitoring, we were able to provide malware detection for IoT using a central node that can be installed within the network.
arXiv Detail & Related papers (2020-10-13T10:56:33Z) - IoT Device Identification Using Deep Learning [43.0717346071013]
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers.
The widely adopted bring your own device (BYOD) policy which allows an employee to bring any IoT device into the workplace and attach it to an organization's network also increases the risk of attacks.
In this study, we applied deep learning on network traffic to automatically identify IoT devices connected to the network.
arXiv Detail & Related papers (2020-02-25T12:24:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.