Technique for IoT malware detection based on control flow graph analysis
نویسندگان
چکیده
The Internet of Things (IoT) refers to the millions devices around world that are connected Internet. Insecure IoT designed without proper security features targets many threats. rapid integration into infrastructure in various areas human activity, including vulnerable critical infrastructure, makes detection malware increasingly important. Annual reports from cybersecurity companies and antivirus software vendors show an increase attacks targeting infrastructure. This demonstrates failure modern methods for detecting on things. is why there urgent need new approaches protect attacks. subject research process Things. study aims develop a technique based control flow graph analysis. Results. paper presents approach Control graphs were built suspicious applications. represented as directed graph, which contains information about components program transitions between them. Based metrics can be extracted describe structure program. Considering applications small due simplicity limitations operating system environment, analysis seems possible environment. To analyze behavior application each action built. It shows abstract description application, sequence formed. allows defining program’s behavior. Thus, with aim detection, two models sequences used. Since you both overall it achieve high accuracy. proposed unknown malware, modified versions known malware. As mean conclusion-making concerning presence, set machine learning classifiers was employed. experimental results demonstrated accuracy detection. Conclusions. A has been developed. detect efficiency.
منابع مشابه
Annotated Control Flow Graph for Metamorphic Malware Detection
Metamorphism is a technique that mutates the binary code using different obfuscations and never keeps the same sequence of opcodes in the memory. This stealth technique provides the capability to a malware for evading detection by simple signature-based (such as instruction sequences, byte sequences and string signatures) anti-malware programs. In this paper, we present a new scheme named Annot...
متن کاملMetamorphic Malware Detection using Control Flow Graph Mining
Metamorphic malware propagation has persuaded the security society to consider about new approaches to confront this generation of malware with novel solutions. Control Flow Graph, CFG, has been successful in detection of simple malwares. By now, it needs to improve the CFG based detection methods to detect metamorphic malwares efficiently. Our Approach has improved the simple CFG with benefici...
متن کاملMalware Analysis using Multiple API Sequence Mining Control Flow Graph
Malwares are becoming persistent by creating fulledged variants of the same or different family. Malwares belonging to same family share same characteristics in their functionality of spreading infections into the victim computer. These similar characteristics among malware families can be taken as a measure for creating a solution that can help in the detection of the malware belonging to part...
متن کاملLinear SVM-Based Android Malware Detection for Reliable IoT Services
Current many Internet ofThings (IoT) services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. Inmost cases, mobile devices have become clutteredwith important personal user...
متن کاملGMAD: Graph-based Malware Activity Detection by DNS traffic analysis
Malicious activities on the Internet are one of the most dangerous threats to Internet users and organizations. Malicious software controlled remotely is addressed as one of the most critical methods for executing the malicious activities. Since blocking domain names for command and control (C&C) of the malwares by analyzing their Domain Name System (DNS) activities has been the most effective ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Radìoelektronnì ì komp'ûternì sistemi
سال: 2022
ISSN: ['2663-2012', '1814-4225']
DOI: https://doi.org/10.32620/reks.2022.1.11