Abstract
The rapid evolution of technology in our society has brought great advantages, but at the same time it has increased cybersecurity threats. At the forefront of these threats is the proliferation of malware from traditional computing platforms to the rapidly expanding Internet-of-things. Our research focuses on the development of a malware detection system that strives for early detection as a means of mitigating the effects of the malware’s execution. The proposed scheme consists of a dual-stage detector providing malware detection for compromised devices in order to mitigate the devices malicious behavior. Furthermore, the framework analyzes task structure features as well as the system calls and memory access patterns made by a process to determine its validity and integrity. The proposed scheme uses all three approaches applying an ensemble technique to detect malware. In our work we evaluate these three malware detection strategies to determine their effectiveness and performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aziz, A.S.A., Hassanien, A.E., Hanaf, S.E., Tolba, M.F.: Multi-layer hybrid machine learning techniques for anomalies detection and classification approach. In: 13th International Conference on Hybrid Intelligent Systems (HIS 2013), pp. 215–220, December 2013
Blokhin, K., Saxe, J., Mentis, D.: Malware similarity identification using call graph based system call subsequence features. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 6–10, July 2013
Cabrera, J.B.D., Lewis, L., Mehra, R.K.: Detection and classification of intrusions and faults using sequences of system calls. SIGMOD Rec. 30(4), 25–34 (2001)
Canzanese, R., Mancoridis, S., Kam, M.: Run-time classification of malicious processes using system call analysis. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp. 21–28, October 2015
Canzanese, R., Mancoridis, S., Kam, M.: System call-based detection of malicious processes. In: 2015 IEEE International Conference on Software Quality, Reliability and Security, pp. 119–124, August 2015
Carbone, M., Cui, W., Lu, L., Lee, W., Peinado, M., Jiang, X.: Mapping kernel objects to enable systematic integrity checking. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 555–565. ACM, New York (2009)
Dolan-Gavitt, B., Srivastava, A., Traynor, P., Giffin, J.: Robust signatures for kernel data structures. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 566–577. ACM, New York (2009)
Dorj, E., Altangerel, E.: Anomaly detection approach using hidden Markov model. In: Ifost, vol. 2, pp. 141–144 (2013)
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, SP 1996, p. 120. IEEE Computer Society, Washington, DC (1996)
Fuyong, Z., Tiezhu, Z.: Malware detection and classification based on n-grams attribute similarity. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 793–796, July 2017
Houmansadr, A., Zonouz, S.A., Berthier, R.: A cloud-based intrusion detection and response system for mobile phones. In: Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, DSNW 2011, pp. 31–32. IEEE Computer Society, Washington, DC (2011)
Jain, A., Singh, A.K.: Integrated malware analysis using machine learning. In: 2017 2nd International Conference on Telecommunication and Networks (TEL-NET), pp. 1–8, August 2017
Jaiswal, M., Malik, Y., Jaafar, F.: Android gaming malware detection using system call analysis. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–5, March 2018
Liu, S., Huang, H., Chen, Y.: A system call analysis method with MapReduce for malware detection. In: 2011 IEEE 17th International Conference on Parallel and Distributed Systems, pp. 631–637, December 2011
Rhee, J., Riley, R., Lin, Z., Jiang, X., Xu, D.: Data-centric OS kernel malware characterization. IEEE Trans. Inf. Forensics Secur. 9(1), 72–87 (2014)
Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639–668 (2011)
Shahzad, F., Bhatti, S., Shahzad, M., Farooq, M.: In-execution malware detection using task structures of Linux processes. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–6, June 2011
Sun, L., Nakajima, T.: A lightweight kernel objects monitoring infrastructure for embedded systems. In: 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 55–60, August 2008
Upadhyay, H., Gohel, H., Pons, A., Lagos, L.: Virtual memory introspection framework for cyber threat detection in virtual environment. Adv. Sci. Technol. Eng. Syst. J. 3, 25–29 (2018)
Upadhyay, H., Gohel, H.A., Pons, A., Lagos, L.: Windows virtualization architecture for cyber threats detection. In: 2018 1st International Conference on Data Intelligence and Security (ICDIS), pp. 119–122, April 2018
Xie, L., Zhang, X., Seifert, J.-P., Zhu, S.: pBMDS: a behavior-based malware detection system for cellphone devices, pp. 37–48, March 2010
Xin, K., Li, G., Qin, Z., Zhang, Q.: Malware detection in smartphone using hidden Markov model. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, pp. 857–860, November 2012
Xu, Z., Ray, S., Subramanyan, P., Malik, S.: Malware detection using machine learning based analysis of virtual memory access patterns. In: Design, Automation Test in Europe Conference Exhibition (DATE) 2017, pp. 169–174, March 2017
Yuan, X.: PhD forum: deep learning-based real-time malware detection with multi-stage analysis. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–2, May 2017
Zhao, K., Li, Q., Kang, J., Jiang, D., Hu, L.: Design and implementation of secure auditing system in Linux kernel. In: 2007 International Workshop on Anti-counterfeiting, Security and Identification (ASID), pp. 232–236, April 2007
Zhao, K., Zhang, D., Su, X., Li, W.: Fest: a feature extraction and selection tool for Android malware detection. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 714–720, July 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply
About this paper
Cite this paper
Heras, R., Perez-Pons, A. (2020). Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical Devices. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)