Skip to main content

2018 | OriginalPaper | Buchkapitel

Graph-Based Comparison of IoT and Android Malware

verfasst von : Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, Daehun Nyang, Aziz Mohaisen

Erschienen in: Computational Data and Social Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The growth in the number of android and Internet of Things (IoT) devices has witnessed a parallel increase in the number of malicious software (malware) that can run on both, affecting their ecosystems. Thus, it is essential to understand those malware towards their detection. In this work, we look into a comparative study of android and IoT malware through the lenses of graph measures: we construct abstract structures, using the control flow graph (CFG) to represent malware binaries. Using those structures, we conduct an in-depth analysis of malicious graphs extracted from the android and IoT malware. By reversing 2,874 and 201 malware binaries corresponding to the IoT and android platforms, respectively, extract their CFGs, and analyze them across both general characteristics, such as the number of nodes and edges, as well as graph algorithmic constructs, such as average shortest path, betweenness, closeness, density, etc. Using the CFG as an abstract structure, we emphasize various interesting findings, such as the prevalence of unreachable code in android malware, noted by the multiple components in their CFGs, the high density, strong closeness and betweenness, and larger number of nodes in the android malware, compared to the IoT malware, highlighting its higher order of complexity. We note that the number of edges in android malware is larger than that in IoT malware, highlighting a richer flow structure of those malware samples, despite their structural simplicity (number of nodes). We note that most of those graph-based properties can be used as discriminative features for classification.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Mohaisen, A., Alrawi, O., Mohaisen, M.: AMAL: high-fidelity, behavior-based automated malware analysis and classification. Comput. Secur. 52, 251–266 (2015)CrossRef Mohaisen, A., Alrawi, O., Mohaisen, M.: AMAL: high-fidelity, behavior-based automated malware analysis and classification. Comput. Secur. 52, 251–266 (2015)CrossRef
5.
Zurück zum Zitat Shang, S., Zheng, N., Xu, J., Xu, M., Zhang, H.: Detecting malware variants via function-call graph similarity. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software, MALWARE, pp. 113–120 (2010) Shang, S., Zheng, N., Xu, J., Xu, M., Zhang, H.: Detecting malware variants via function-call graph similarity. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software, MALWARE, pp. 113–120 (2010)
6.
Zurück zum Zitat Mohaisen, A., Alrawi, O.: Unveiling Zeus: automated classification of malware samples. In: Proceedings of the 22nd International World Wide Web Conference, WWW, pp. 829–832 (2013) Mohaisen, A., Alrawi, O.: Unveiling Zeus: automated classification of malware samples. In: Proceedings of the 22nd International World Wide Web Conference, WWW, pp. 829–832 (2013)
7.
Zurück zum Zitat Hu, X., Chiueh, T., Shin, K.G.: Large-scale malware indexing using function-call graphs. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS, pp. 611–620 (2009) Hu, X., Chiueh, T., Shin, K.G.: Large-scale malware indexing using function-call graphs. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS, pp. 611–620 (2009)
8.
Zurück zum Zitat Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium (2003) Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium (2003)
10.
Zurück zum Zitat Tamersoy, A., Roundy, K.A., Chau, D.H.: Guilt by association: large scale malware detection by mining file-relation graphs. In: Proceedings of the the 20th ACM International Conference on Knowledge Discovery and Data Mining, KDD, pp. 1524–1533 (2014) Tamersoy, A., Roundy, K.A., Chau, D.H.: Guilt by association: large scale malware detection by mining file-relation graphs. In: Proceedings of the the 20th ACM International Conference on Knowledge Discovery and Data Mining, KDD, pp. 1524–1533 (2014)
11.
Zurück zum Zitat Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, SP, pp. 590–604 (2014) Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, SP, pp. 590–604 (2014)
14.
Zurück zum Zitat Jang, J.-W., Woo, J., Mohaisen, A., Yun, J., Kim, H.K.: Mal-Netminer: malware classification approach based on social network analysis of system call graph. In: Mathematical Problems in Engineering (2015) Jang, J.-W., Woo, J., Mohaisen, A., Yun, J., Kim, H.K.: Mal-Netminer: malware classification approach based on social network analysis of system call graph. In: Mathematical Problems in Engineering (2015)
15.
Zurück zum Zitat Gascon, H., Yamaguchi, F., Arp, D., Rieck, K.: Structural detection of android malware using embedded call graphs. In: Proceedings of the ACM Workshop on Artificial Intelligence and Security, AISec, pp. 45–54 (2013) Gascon, H., Yamaguchi, F., Arp, D., Rieck, K.: Structural detection of android malware using embedded call graphs. In: Proceedings of the ACM Workshop on Artificial Intelligence and Security, AISec, pp. 45–54 (2013)
16.
Zurück zum Zitat Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS, pp. 1105–1116 (2014) Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS, pp. 1105–1116 (2014)
17.
Zurück zum Zitat Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: a novel honeypot for revealing current IoT threats. J. Inf. Process. JIP 24, 522–533 (2016) Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: a novel honeypot for revealing current IoT threats. J. Inf. Process. JIP 24, 522–533 (2016)
18.
Zurück zum Zitat Shen, F., Vecchio, J.D., Mohaisen, A., Ko, S.Y., Ziarek, L.: Android malware detection using complex-flows. In: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, ICDCS, pp. 2430–2437 (2017) Shen, F., Vecchio, J.D., Mohaisen, A., Ko, S.Y., Ziarek, L.: Android malware detection using complex-flows. In: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, ICDCS, pp. 2430–2437 (2017)
Metadaten
Titel
Graph-Based Comparison of IoT and Android Malware
verfasst von
Hisham Alasmary
Afsah Anwar
Jeman Park
Jinchun Choi
Daehun Nyang
Aziz Mohaisen
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-04648-4_22

Premium Partner