Skip to main content
Erschienen in: Mobile Networks and Applications 4/2021

08.01.2020

Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor

verfasst von: Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As more and more applications migrate to clouds, the type and amount of malware attack against virtualized environments are increasing, which is a key factor that restricts the widespread deployment and application of cloud platforms. Traditional in-VM-based security software is not effective against malware attacks, as the security software itself becomes the target of malware attacks and can easily be tampered with or even subverted. In this paper, we propose a new malware detection method to improve virtual machine security performance and ensure the security of the entire cloud platform. This paper uses the virtual machine introspection(VMI) combined with the memory forensics analysis(MFA) technology to extract multiple types of dynamic features from the virtual machine memory, the hypervisor layer and the hardware layer. Furthermore, this paper proposes an adaptive feature selection method. By combining three different search strategies, three types of features are compared and analyzed from three aspects: effectiveness, system load and security. By adjusting the weight of each feature, it meets the detection requirements of different malware in the cloud environment as expected. Finally, the detection method improves the detection accuracy and generalization ability of the overall classifier using the AdaBoost ensemble learning method with Voting’s combination strategy. The experiment used a large number of real malicious samples, and achieved an accuracy of 0.999 (AUC), with a maximum performance overhead of 5.6%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
3.
Zurück zum Zitat Mishra P, Pilli ES, Varadharajant V, Tupakula U (2016) Nvcloudids: a security architecture to detect intrusions at network and virtualization layer in cloud environment. In: 2016 international conference on advances in computing, communications and informatics (ICACCI), pp 56–62, DOI https://doi.org/10.1109/ICACCI.2016.7732025, (to appear in print) Mishra P, Pilli ES, Varadharajant V, Tupakula U (2016) Nvcloudids: a security architecture to detect intrusions at network and virtualization layer in cloud environment. In: 2016 international conference on advances in computing, communications and informatics (ICACCI), pp 56–62, DOI https://​doi.​org/​10.​1109/​ICACCI.​2016.​7732025, (to appear in print)
5.
Zurück zum Zitat Payne BD, Carbone M, Sharif M, Lee W (2008) Lares: an architecture for secure active monitoring using virtualization. In: 2008 IEEE symposium on security and privacy (sp 2008), pp 233–247, DOI https://doi.org/10.1109/SP.2008.24, (to appear in print) Payne BD, Carbone M, Sharif M, Lee W (2008) Lares: an architecture for secure active monitoring using virtualization. In: 2008 IEEE symposium on security and privacy (sp 2008), pp 233–247, DOI https://​doi.​org/​10.​1109/​SP.​2008.​24, (to appear in print)
7.
Zurück zum Zitat Xiao J, Lu L, Wang H, Zhu X (2016) Hyperlink: Virtual machine introspection and memory forensic analysis without kernel source code. In: 2016 IEEE international conference on autonomic computing (ICAC), pp 127–136, DOI https://doi.org/10.1109/ICAC.2016.46, (to appear in print) Xiao J, Lu L, Wang H, Zhu X (2016) Hyperlink: Virtual machine introspection and memory forensic analysis without kernel source code. In: 2016 IEEE international conference on autonomic computing (ICAC), pp 127–136, DOI https://​doi.​org/​10.​1109/​ICAC.​2016.​46, (to appear in print)
8.
Zurück zum Zitat Fu Y, Zeng J, Lin Z (2014) Hypershell: a practical hypervisor layer guest os shell for automated in-vm management. In: 2014 USENIX annual technical conference (USENIX ATC 14), pp 85–96 Fu Y, Zeng J, Lin Z (2014) Hypershell: a practical hypervisor layer guest os shell for automated in-vm management. In: 2014 USENIX annual technical conference (USENIX ATC 14), pp 85–96
13.
Zurück zum Zitat Kong D, Yan G (2013) Discriminant malware distance learning on structural information for automated malware classification. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1357–1365, DOI https://doi.org/10.1145/2465529.2465531, (to appear in print) Kong D, Yan G (2013) Discriminant malware distance learning on structural information for automated malware classification. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1357–1365, DOI https://​doi.​org/​10.​1145/​2465529.​2465531, (to appear in print)
15.
Zurück zum Zitat Jang J, Brumley D, Venkataraman S (2011) Bitshred: feature hashing malware for scalable triage and semantic analysis. In: Proceedings of the 18th ACM conference on Computer and communications security, pp 309–320, DOI https://doi.org/10.1145/2046707.2046742, (to appear in print) Jang J, Brumley D, Venkataraman S (2011) Bitshred: feature hashing malware for scalable triage and semantic analysis. In: Proceedings of the 18th ACM conference on Computer and communications security, pp 309–320, DOI https://​doi.​org/​10.​1145/​2046707.​2046742, (to appear in print)
16.
Zurück zum Zitat Ye Y, Li T, Chen Y, Jiang Q (2010) Automatic malware categorization using cluster ensemble. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, pp 95–104, DOI https://doi.org/10.1145/1835804.1835820, (to appear in print) Ye Y, Li T, Chen Y, Jiang Q (2010) Automatic malware categorization using cluster ensemble. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, pp 95–104, DOI https://​doi.​org/​10.​1145/​1835804.​1835820, (to appear in print)
17.
Zurück zum Zitat Garfinkel T, Rosenblum M, et al. (2003) A virtual machine introspection based architecture for intrusion detection. In: Ndss, vol 3, pp 191–206 Garfinkel T, Rosenblum M, et al. (2003) A virtual machine introspection based architecture for intrusion detection. In: Ndss, vol 3, pp 191–206
19.
20.
Zurück zum Zitat Petroni NL Jr, Fraser T, Molina J, Arbaugh WA (2004) Copilot-a coprocessor-based kernel runtime integrity monitor. In: USENIX security symposium, pp 179–194 Petroni NL Jr, Fraser T, Molina J, Arbaugh WA (2004) Copilot-a coprocessor-based kernel runtime integrity monitor. In: USENIX security symposium, pp 179–194
21.
Zurück zum Zitat Dolan-Gavitt B, Leek T, Zhivich M, Giffin J, Lee W (2011) Virtuoso: Narrowing the semantic gap in virtual machine introspection. In: 2011 IEEE symposium on security and privacy, pp 297–312, DOI https://doi.org/10.1109/SP.2011.11, (to appear in print) Dolan-Gavitt B, Leek T, Zhivich M, Giffin J, Lee W (2011) Virtuoso: Narrowing the semantic gap in virtual machine introspection. In: 2011 IEEE symposium on security and privacy, pp 297–312, DOI https://​doi.​org/​10.​1109/​SP.​2011.​11, (to appear in print)
22.
Zurück zum Zitat Fu Y, Lin Z (2012) Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In: 2012 IEEE symposium on security and privacy, pp 586–600, DOI https://doi.org/10.1109/SP.2012.40, (to appear in print) Fu Y, Lin Z (2012) Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In: 2012 IEEE symposium on security and privacy, pp 586–600, DOI https://​doi.​org/​10.​1109/​SP.​2012.​40, (to appear in print)
23.
Zurück zum Zitat Saberi A, Fu Y, Lin Z (2014) Hybrid-bridge: Efficiently bridging the semantic gap in virtual machine introspection via decoupled execution and training memoization. In: Proceedings of the 21st annual network and distributed system security symposium Saberi A, Fu Y, Lin Z (2014) Hybrid-bridge: Efficiently bridging the semantic gap in virtual machine introspection via decoupled execution and training memoization. In: Proceedings of the 21st annual network and distributed system security symposium
24.
25.
Zurück zum Zitat Avritzer A, Tanikella R, James K, Cole RG, Weyuker E (2010) Monitoring for security intrusion using performance signatures. In: Proceedings of the first joint WOSP/SIPEW international conference on performance engineering, pp 93–104, DOI https://doi.org/10.1145/1712605.1712623, (to appear in print) Avritzer A, Tanikella R, James K, Cole RG, Weyuker E (2010) Monitoring for security intrusion using performance signatures. In: Proceedings of the first joint WOSP/SIPEW international conference on performance engineering, pp 93–104, DOI https://​doi.​org/​10.​1145/​1712605.​1712623, (to appear in print)
29.
Zurück zum Zitat Dinaburg A, Royal P, Sharif M, Lee W (2008) Ether: malware analysis via hardware virtualization extensions. In: Proceedings of the 15th ACM conference on computer and communications security, pp 51–62, DOI https://doi.org/10.1145/1455770.1455779, (to appear in print) Dinaburg A, Royal P, Sharif M, Lee W (2008) Ether: malware analysis via hardware virtualization extensions. In: Proceedings of the 15th ACM conference on computer and communications security, pp 51–62, DOI https://​doi.​org/​10.​1145/​1455770.​1455779, (to appear in print)
30.
Zurück zum Zitat Dai S-Y, Fyodor Y, Wu J-S, Lin C-H, Huang Y, Kuo S-Y (2009) Holography: a hardware virtualization tool for malware analysis. In: 2009 15th IEEE Pacific rim international symposium on dependable computing, pp 263–268, DOI https://doi.org/10.1109/PRDC.2009.48, (to appear in print) Dai S-Y, Fyodor Y, Wu J-S, Lin C-H, Huang Y, Kuo S-Y (2009) Holography: a hardware virtualization tool for malware analysis. In: 2009 15th IEEE Pacific rim international symposium on dependable computing, pp 263–268, DOI https://​doi.​org/​10.​1109/​PRDC.​2009.​48, (to appear in print)
31.
Zurück zum Zitat Henderson A, Prakash A, Yan LK, Hu X, Wang X, Zhou R, Yin H (2014) Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform. In: Proceedings of the 2014 international symposium on software testing and analysis, pp 248–258, DOI https://doi.org/10.1145/2610384.2610407, (to appear in print) Henderson A, Prakash A, Yan LK, Hu X, Wang X, Zhou R, Yin H (2014) Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform. In: Proceedings of the 2014 international symposium on software testing and analysis, pp 248–258, DOI https://​doi.​org/​10.​1145/​2610384.​2610407, (to appear in print)
37.
Zurück zum Zitat Weaver VM (2013) Linux perf_event features and overhead. In: The 2nd international workshop on performance analysis of workload optimized systems, FastPath, vol. 13 Weaver VM (2013) Linux perf_event features and overhead. In: The 2nd international workshop on performance analysis of workload optimized systems, FastPath, vol. 13
38.
Zurück zum Zitat Lengyel TK, Maresca S, Payne BD, Webster GD, Vogl S, Kiayias A (2014) Scalability, fidelity and stealth in the drakvuf dynamic malware analysis system. In: Proceedings of the 30th annual computer security applications conference, pp 386–395, DOI https://doi.org/10.1145/2664243.2664252, (to appear in print) Lengyel TK, Maresca S, Payne BD, Webster GD, Vogl S, Kiayias A (2014) Scalability, fidelity and stealth in the drakvuf dynamic malware analysis system. In: Proceedings of the 30th annual computer security applications conference, pp 386–395, DOI https://​doi.​org/​10.​1145/​2664243.​2664252, (to appear in print)
41.
Zurück zum Zitat Nataraj L, Karthikeyan S, Jacob G, Manjunath B (2011) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security, p 4, DOI https://doi.org/10.1145/2016904.2016908, (to appear in print) Nataraj L, Karthikeyan S, Jacob G, Manjunath B (2011) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security, p 4, DOI https://​doi.​org/​10.​1145/​2016904.​2016908, (to appear in print)
43.
49.
Zurück zum Zitat Salza P, Ferrucci F (2019) Speed up genetic algorithms in the cloud using software containers. Futur Gener Comput Syst 92:276–289CrossRef Salza P, Ferrucci F (2019) Speed up genetic algorithms in the cloud using software containers. Futur Gener Comput Syst 92:276–289CrossRef
50.
53.
Zurück zum Zitat Khasawneh KN, Ozsoy M, Donovick C, Abu-Ghazaleh N, Ponomarev D (2015) Ensemble learning for low-level hardware-supported malware detection. In: International workshop on recent advances in intrusion detection, pp 3–25, DOI https://doi.org/10.1007/978-3-319-26362-5_1, (to appear in print) Khasawneh KN, Ozsoy M, Donovick C, Abu-Ghazaleh N, Ponomarev D (2015) Ensemble learning for low-level hardware-supported malware detection. In: International workshop on recent advances in intrusion detection, pp 3–25, DOI https://​doi.​org/​10.​1007/​978-3-319-26362-5_​1, (to appear in print)
Metadaten
Titel
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor
verfasst von
Jian Zhang
Cheng Gao
Liangyi Gong
Zhaojun Gu
Dapeng Man
Wu Yang
Wenzhen Li
Publikationsdatum
08.01.2020
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2021
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01503-4

Weitere Artikel der Ausgabe 4/2021

Mobile Networks and Applications 4/2021 Zur Ausgabe

Neuer Inhalt