skip to main content
10.1145/3510513.3510521acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicnccConference Proceedingsconference-collections
research-article

The Iot Malware Classification Method Based On Visual Local Features

Authors Info & Claims
Published:10 May 2022Publication History

ABSTRACT

This paper proposed a Internet of things (IoT) malware classification method, which uses a novel visual local feature based on sections of the malware binary. This method filter binary file section of malware samples, then divides the section contents into groups of 8 bits, and visualize the gray-scale image. Finally, we extract normalized gray-scale image sequence as the visual local feature of IoT malware, compared with the visual global features based on the malware binary, it can achieve approximate classification accuracy with low cost. In addition, in order to improve the classification accuracy of the method, a local feature generation model based on Generative Adversarial Nets (GAN) was designed. The method has been implemented and tested on a set of 2358 malware instances in 9 families, compared with the traditional classification methods based on the global features, local features of section combination based on text, data, rodata can achieve better results, and the classification accuracy achieves 90.3%.

References

  1. Shalaginov A , Banin S , Dehghantanha A , Machine Learning Aided Static Malware Analysis: A Survey and Tutorial. 2018.Google ScholarGoogle Scholar
  2. Kaspersky Lab: Internet of things security threat has changed from concept to reality [EB/OL]. [2017-06-22]. https://www.gkzhan. com/news/ detail /101407.html.Google ScholarGoogle Scholar
  3. Kaspersky Lab: the number of Internet of things malware has more than doubled since last year [EB/OL]. [2017-07-04]. https://deve loper. aliyun .com/article/171328.Google ScholarGoogle Scholar
  4. Tencent released the 2018 IOT security threat analysis report[EB/OL].[2019-01-03].https://smart.huanqiu.com/a rticle/9CaKrnKgBmQ.Google ScholarGoogle Scholar
  5. Significant Internet of things security trend in 2020 [EB/OL].[2020-03-19].https://www.aqniu.com/vendor/65 415.html.Google ScholarGoogle Scholar
  6. Zhang Y , Huang Q , Ma X , Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification[C]// 2016 IEEE Trustcom/BigDataSE/I SPA. IEEE, 2017.Google ScholarGoogle Scholar
  7. Michael Sikorski and Andrew Honig. Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Software, ISBN 978-1-59327-290-6[M]. No Starch Press.2012.Google ScholarGoogle Scholar
  8. Sun, H., Wang, X., Buyya, R. and Su, J., 2017. CloudEyes: Cloud based malware detection with reversible sketch for resource constrained internet of things (IoT) devices. Software: Practice and Experience,47(3), pp.421-441.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bhodia N , Prajapati P , Troia F D , Transfer Learning for Image-Based Malware Classification[C]// International Conference on International Workshop on Formal Methods for Security Engineering. 2019.Google ScholarGoogle Scholar
  10. Kumar N , Mukhopadhyay S , Gupta M , Malware Classification using Early Stage Behavioral Analysis[C]// 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). 2019.Google ScholarGoogle Scholar
  11. Abdurrahman, Pekta, Tankut, Deep learning for effective Android malware detection using API call graph embeddings[J]. Soft Computing, 2020.Google ScholarGoogle Scholar
  12. [Hong J , Park S , Kim T , Malware classification for identifying author groups: a graph-based approach. 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Wen H , Zhang W , Hu Y , Lightweight IoT Malware Visualization Analysis via Two-Bits Networks[M]// Wireless Algorithms, Systems, and Applications. Springer, Cham, 2019.Google ScholarGoogle Scholar
  14. Dewen Wang, Kaihua Yang. Power theft detection data generation method based on generative countermeasure network [J]. Power grid technology, 2020, 44(2).Google ScholarGoogle Scholar
  15. Yong Z , Shao Y M , Xi Z , EDGAN: motion deblurring algorithm based on enhanced generative adversarial networks[J]. The Journal of Supercomputing, 2020.Google ScholarGoogle Scholar
  16. Mu J , Zhou Y , Cao S , Enhanced Evolutionary Generative Adversarial Networks[C]// 2020 39th Chinese Control Conference (CCC). IEEE, 2020.Google ScholarGoogle Scholar
  17. MALSHARE, A community driven public malware repository [EB/OL]. https://malshare.com.Google ScholarGoogle Scholar
  18. VirusSign, A service that automatically collects malware samples and provide controlled access to the files [EB/OL]. http://www. virusign.com.Google ScholarGoogle Scholar
  19. Linux cloud computing network [EB/OL]. [2012-08-05].https://www.cnblogs.com/bakari/archive/2012/08/05/2623637.html.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICNCC '21: Proceedings of the 2021 10th International Conference on Networks, Communication and Computing
    December 2021
    146 pages
    ISBN:9781450385848
    DOI:10.1145/3510513

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 May 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)29
    • Downloads (Last 6 weeks)2

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format