Skip to main content
Erschienen in: Wireless Personal Communications 4/2019

10.05.2019

Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence

verfasst von: Hamad Naeem

Erschienen in: Wireless Personal Communications | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) devices are increasingly deployed for different purposes such as data sensing, collecting and controlling. IoT improves user experiences by allowing a large number of smart devices to connect and share information. Many existing malware attacks, targeted at traditional computers connected to the Internet, may also be directed at IoT devices. Therefore, efficient protection at IoT devices could save millions of internet users from malicious activities. However, existing malware detection approaches suffer from high computational complexity. In this study, we propose a more accurate and fast model for detecting malware in the IoT environment. We introduce a Malware Threat Hunting System (MTHS) in the proposed model. MTHS first converts malware binary into a color image and then conducts the machine or deep learning analysis for efficient malware detection. We finally prepare a baseline to compare the performance of MTHS with traditional state-of-the-art malware detection approaches. We conduct experiments on two public datasets of Windows and Android software. The experimental results indicate that the response time and the detection accuracy of MTHS are better than those of previous machine learning and deep learning approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yilin, Y., Lifa, W., Zheng, H., & Kangyu, H. (2017). A risk classification based approach for android malware detection. KSII Transactions on Internet and Information Systems, 11(2), 959–981. Yilin, Y., Lifa, W., Zheng, H., & Kangyu, H. (2017). A risk classification based approach for android malware detection. KSII Transactions on Internet and Information Systems, 11(2), 959–981.
2.
Zurück zum Zitat Asaf, S., Robert, M., Yuval, E., & Chanan, G. (2009). Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report, 14(1), 16–29.CrossRef Asaf, S., Robert, M., Yuval, E., & Chanan, G. (2009). Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report, 14(1), 16–29.CrossRef
3.
Zurück zum Zitat Manuel, E., Theodoor, S., Engin, K., & Christopher, K. (2012). A survey on automated dynamic malware-analysis techniques and tools. ACM Transaction, 44(2), 1–42. Manuel, E., Theodoor, S., Engin, K., & Christopher, K. (2012). A survey on automated dynamic malware-analysis techniques and tools. ACM Transaction, 44(2), 1–42.
6.
Zurück zum Zitat Ekta, G., Divya, B., & Sanjeev, S. (2014). Malware analysis and classification: A survey. Journal of Information Security, 5, 56–64.CrossRef Ekta, G., Divya, B., & Sanjeev, S. (2014). Malware analysis and classification: A survey. Journal of Information Security, 5, 56–64.CrossRef
7.
Zurück zum Zitat Moser, A., Kruegel, C., & Kirda, E. (2007). Limits of static analysis for malware detection. In Proceeding of 2007 conference on annual computer security applications, 421–430. Moser, A., Kruegel, C., & Kirda, E. (2007). Limits of static analysis for malware detection. In Proceeding of 2007 conference on annual computer security applications, 421–430.
8.
Zurück zum Zitat Eul, G. I., KyoungSoo, H., Jae, H. L., & Boojoong, K. (2014). Malware analysis using visualized images and entropy graphs. International Journal of Information Security, 14, 1–14. Eul, G. I., KyoungSoo, H., Jae, H. L., & Boojoong, K. (2014). Malware analysis using visualized images and entropy graphs. International Journal of Information Security, 14, 1–14.
9.
Zurück zum Zitat KyoungSoo, H., Jae, H. L., Boojoong, K., & Eul, G. I. (2014). Malware analysis using visualized image matrices. The Scientific World Journal, 2014, 1–15. KyoungSoo, H., Jae, H. L., Boojoong, K., & Eul, G. I. (2014). Malware analysis using visualized image matrices. The Scientific World Journal, 2014, 1–15.
10.
Zurück zum Zitat Lakshman, N. S., Karthikeyan, G. J., & Manjunath, B. S. (2011). Malware images: Visualization and automatic classification, In Proceeding of 2011 ACM conference on visualization for cyber security, 1–4. Lakshman, N. S., Karthikeyan, G. J., & Manjunath, B. S. (2011). Malware images: Visualization and automatic classification, In Proceeding of 2011 ACM conference on visualization for cyber security, 1–4.
11.
Zurück zum Zitat Ban, X., Chen, L., Hu, W., & Wu, Q. (2014). Malware variant detection using similarity search over content fingerprint, In Proceeding of 2014 IEEE conference on control and decision, 5334–5339. Ban, X., Chen, L., Hu, W., & Wu, Q. (2014). Malware variant detection using similarity search over content fingerprint, In Proceeding of 2014 IEEE conference on control and decision, 5334–5339.
12.
Zurück zum Zitat Oliva, A., & Torralba, A. (2001). Modeling the shape of the scene: A holistic representation of the spatial envelope. International journal of computer vision, 42, 145–175.MATHCrossRef Oliva, A., & Torralba, A. (2001). Modeling the shape of the scene: A holistic representation of the spatial envelope. International journal of computer vision, 42, 145–175.MATHCrossRef
13.
Zurück zum Zitat Barath, N. N., Ouboti, D. B., & Temesguen, M. K. (2016). Pattern recognition algorithms for malware classification, In Proceeding of 2016 IEEE conference of aerospace and electronics, 338–342. Barath, N. N., Ouboti, D. B., & Temesguen, M. K. (2016). Pattern recognition algorithms for malware classification, In Proceeding of 2016 IEEE conference of aerospace and electronics, 338–342.
14.
Zurück zum Zitat Kesav, K., John, D., & Srinivas, M. (2016). Packer identification using Byte plot and Markov plot. Journal of Computer Hacking Virology Techniques, 12(2), 101–111.CrossRef Kesav, K., John, D., & Srinivas, M. (2016). Packer identification using Byte plot and Markov plot. Journal of Computer Hacking Virology Techniques, 12(2), 101–111.CrossRef
15.
Zurück zum Zitat Kesav, K., & Srinivas, M. (2013).Image visualization based malware detection, In Proceeding of 2013 IEEE conference on computational intelligence in cyber security, 40–44. Kesav, K., & Srinivas, M. (2013).Image visualization based malware detection, In Proceeding of 2013 IEEE conference on computational intelligence in cyber security, 40–44.
16.
Zurück zum Zitat Bay, H., Ess, A., Tuytelaars, T., & Van, G. L. (2008). Computer vision and image understanding. Speeded-Up Robust Features (SURF), 110, 346–359. Bay, H., Ess, A., Tuytelaars, T., & Van, G. L. (2008). Computer vision and image understanding. Speeded-Up Robust Features (SURF), 110, 346–359.
17.
Zurück zum Zitat Lowe, D. (1999). Object recognition from local scale-invariant features. ICCV, 99(2), 1150–1157. Lowe, D. (1999). Object recognition from local scale-invariant features. ICCV, 99(2), 1150–1157.
18.
Zurück zum Zitat Jae, H. L., KyoungSoo, H., & Eul, G. I., (2013). Malware analysis method using visualization of binary files In Proceeding of 2013 ACM conference on research in adaptive and convergent systems, 317–321. Jae, H. L., KyoungSoo, H., & Eul, G. I., (2013). Malware analysis method using visualization of binary files In Proceeding of 2013 ACM conference on research in adaptive and convergent systems, 317–321.
19.
Zurück zum Zitat Aziz, M., & Anita, P. (2017). Malware class recognition using image processing techniques, In Proceeding of 2017 IEEE conference on data management, analytics and innovation, 76–80. Aziz, M., & Anita, P. (2017). Malware class recognition using image processing techniques, In Proceeding of 2017 IEEE conference on data management, analytics and innovation, 76–80.
20.
Zurück zum Zitat Mahmoud, K., Mrigank, R., Noman, M., Neil, D. B., Yang, W., & Farkhund, I. (2018). Malware classification with deep convolutional neural networks, In Proceeding of 9th IFIP international conference on new technologies, mobility and security (NTMS), 1–5. Mahmoud, K., Mrigank, R., Noman, M., Neil, D. B., Yang, W., & Farkhund, I. (2018). Malware classification with deep convolutional neural networks, In Proceeding of 9th IFIP international conference on new technologies, mobility and security (NTMS), 1–5.
21.
Zurück zum Zitat Rajesh, K., Zhang, X., Riaz, U. K., Ijaz, A., & Jay, K. (2018). Malicious code detection based on image processing using deep learning, In Proceeding of international conference on computing and artificial intelligence (ICCAI), 81–85. Rajesh, K., Zhang, X., Riaz, U. K., Ijaz, A., & Jay, K. (2018). Malicious code detection based on image processing using deep learning, In Proceeding of international conference on computing and artificial intelligence (ICCAI), 81–85.
22.
Zurück zum Zitat Zhihua, C., Fei, X., Xingjuan, C., Yang, C., Gai-ge, W., & Jinjun, C. (2018). Detection of malicious code variants based on deep learning. IEEE Transactions on Industrial Informatics, 14(7), 3187–3196.CrossRef Zhihua, C., Fei, X., Xingjuan, C., Yang, C., Gai-ge, W., & Jinjun, C. (2018). Detection of malicious code variants based on deep learning. IEEE Transactions on Industrial Informatics, 14(7), 3187–3196.CrossRef
23.
Zurück zum Zitat Al-hawawreh, M., Moustafa, N., & Sitnikova, E. (2018). Identification of malicious activities in industrial internet of things based on deep learning models. Journal of Information Security and Applications, 41, 1–11.CrossRef Al-hawawreh, M., Moustafa, N., & Sitnikova, E. (2018). Identification of malicious activities in industrial internet of things based on deep learning models. Journal of Information Security and Applications, 41, 1–11.CrossRef
24.
Zurück zum Zitat Fei-Fei, L., & Perona, P. (2005). A Bayesian hierarchical model for learning natural scene categories, In Proceedings of 2005 IEEE computer vision and pattern recognition, 524–531. Fei-Fei, L., & Perona, P. (2005). A Bayesian hierarchical model for learning natural scene categories, In Proceedings of 2005 IEEE computer vision and pattern recognition, 524–531.
25.
Zurück zum Zitat Hashemi, H., & Hamzeh, A. (2018). Visual Malware Detection Using Local Malicious Pattern. Journal of Computer Virology and Hacking Techniques, 15(1), 1–14.CrossRef Hashemi, H., & Hamzeh, A. (2018). Visual Malware Detection Using Local Malicious Pattern. Journal of Computer Virology and Hacking Techniques, 15(1), 1–14.CrossRef
26.
Zurück zum Zitat Tian, Q., & Zhang, S. (2009). Descriptive visual word sand visual phrases for image applications (pp. 19–24). France: ACM Multimedia. Tian, Q., & Zhang, S. (2009). Descriptive visual word sand visual phrases for image applications (pp. 19–24). France: ACM Multimedia.
27.
Zurück zum Zitat Wu, J., & Yu, Z. (2016). Good practices for learning to recognize actions using FV and VLAD. IEEE Transaction on cybernetic, 46(12), 2978–2990.CrossRef Wu, J., & Yu, Z. (2016). Good practices for learning to recognize actions using FV and VLAD. IEEE Transaction on cybernetic, 46(12), 2978–2990.CrossRef
28.
Zurück zum Zitat Ma, B., Su, Y., & Jurie, F. (2012). Local descriptors encoded by fisher vectors for person re-identification, In Proceedings of European conference on computer vision, 413–422. Ma, B., Su, Y., & Jurie, F. (2012). Local descriptors encoded by fisher vectors for person re-identification, In Proceedings of European conference on computer vision, 413–422.
29.
Zurück zum Zitat Oliva, A., & Torralba, A. (2006). Building the gist of a scene: The role of global image features, progress in brain research, 15. Oliva, A., & Torralba, A. (2006). Building the gist of a scene: The role of global image features, progress in brain research, 15.
30.
Zurück zum Zitat Hamad, N., Bing, G., Muhammad, R. N., Farhan, U., Hamzah, A., & Muhammad, S. J. (2019). Identification of malicious code variants based on image visualization. Computers & Electrical Engineering, 76, 225–237.CrossRef Hamad, N., Bing, G., Muhammad, R. N., Farhan, U., Hamzah, A., & Muhammad, S. J. (2019). Identification of malicious code variants based on image visualization. Computers & Electrical Engineering, 76, 225–237.CrossRef
31.
Zurück zum Zitat Hamad, N., Bing, G., Muhammad, R. N., Muhammad, A., & Muhammad, S. J. (2017). A new approach for image detection based on refined Bag of Words algorithm. Optik - International Journal for Light and Electron Optics, 140, 823–832.CrossRef Hamad, N., Bing, G., Muhammad, R. N., Muhammad, A., & Muhammad, S. J. (2017). A new approach for image detection based on refined Bag of Words algorithm. Optik - International Journal for Light and Electron Optics, 140, 823–832.CrossRef
32.
Zurück zum Zitat Jorge, S., Florent, P., Thomas, M., & Jakob, V. (2013). Image classification with the fisher vector: Theory and practice. International Journal of Computer Vision, 105(3), 222–245.MathSciNetMATHCrossRef Jorge, S., Florent, P., Thomas, M., & Jakob, V. (2013). Image classification with the fisher vector: Theory and practice. International Journal of Computer Vision, 105(3), 222–245.MathSciNetMATHCrossRef
33.
Zurück zum Zitat Bouvrie, J. (2006). Notes on convolutional neural networks, technical notes. Bouvrie, J. (2006). Notes on convolutional neural networks, technical notes.
34.
Zurück zum Zitat Nitish, S., Geoffrey, H., Alex, K., Ilya, S., & Ruslan, S. (2014). Dropout: A simple way to prevent neural networks from over fitting. Journal of Machine Learning Research, 15(1), 1929–1958.MathSciNetMATH Nitish, S., Geoffrey, H., Alex, K., Ilya, S., & Ruslan, S. (2014). Dropout: A simple way to prevent neural networks from over fitting. Journal of Machine Learning Research, 15(1), 1929–1958.MathSciNetMATH
35.
Zurück zum Zitat Songqing, Y. (2017). Imbalanced malware images classification: A CNN based Approach. Cornell University Library, 1–6. Songqing, Y. (2017). Imbalanced malware images classification: A CNN based Approach. Cornell University Library, 1–6.
36.
Zurück zum Zitat Abien, F. M., & Francis, J. H. P. (2017). Towards building an intelligent anti-malware system: A deep learning approach using support vector machine (SVM) for malware classification, Technical report, 1–5. Abien, F. M., & Francis, J. H. P. (2017). Towards building an intelligent anti-malware system: A deep learning approach using support vector machine (SVM) for malware classification, Technical report, 1–5.
37.
Zurück zum Zitat Zhihua, C., Lei, D., Penghong, W., Xingjuan, C., & Wensheng, Z. (2019). Malicious code detection based on CNNs and multi-objective algorithm, Journal of Parallel and Distributed Computing, 50–58. Zhihua, C., Lei, D., Penghong, W., Xingjuan, C., & Wensheng, Z. (2019). Malicious code detection based on CNNs and multi-objective algorithm, Journal of Parallel and Distributed Computing, 50–58.
Metadaten
Titel
Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence
verfasst von
Hamad Naeem
Publikationsdatum
10.05.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06540-6

Weitere Artikel der Ausgabe 4/2019

Wireless Personal Communications 4/2019 Zur Ausgabe

Neuer Inhalt