MDABP:A Novel Approach to Detect Cross-Architecture IoT Malware Based on PaaS
- 时间:: 2023-03-13
- 作者:: Yang Zhao, Alifu Kuerban
- URL:: Sensors | Free Full-Text | MDABP: A Novel Approach to Detect Cross-Architecture IoT Malware Based on PaaS
- DOI:: 10.3390/s23063060
- pdf链接:: MDABP_2023_Zhao_Kuerban
- zotero链接:: Local library
- 标签:: #动态分析
来源:202306.综述:基于人工智能的物联网恶意代码检测的文献综述
pdf:基于人工智能的物联网恶意代码检测综述_2023_刘奇旭 et al
看了老半天这是篇三区的文章(sensors)
With the development of internet technology, the Internet of Things (IoT) has been widely used in several aspects of human life. However, IoT devices are becoming more vulnerable to malware attacks due to their limited computational resources and the manufacturers’ inability to update the firmware on time. As IoT devices are increasing rapidly, their security must classify malicious software accurately; however, current IoT malware classification methods cannot detect cross-architecture IoT malware using system calls in a particular operating system as the only class of dynamic features. To address these issues, this paper proposes an IoT malware detection approach based on PaaS (Platform as a Service), which detects cross-architecture IoT malware by intercepting system calls generated by virtual machines in the host operating system acting as dynamic features and using the K Nearest Neighbors (KNN) classification model. A comprehensive evaluation using a 1719 sample dataset containing ARM and X86-32 architectures demonstrated that MDABP achieves 97.18% average accuracy and a 99.01% recall rate in detecting samples in an Executable and Linkable Format (ELF). Compared with the best cross-architecture detection method that uses network traffic as a unique type of dynamic feature with an accuracy of 94.5%, practical results reveal that our method uses fewer features and has higher accuracy.
名词:: MDABP
an IoT malware detection approach based on Platform as a Service
名词:: KVM:基于内核的虚拟机
Kernel-based Virtual Machine
名词:: PssS:平台即服务
Platform as a Service
名词:: VMI是什么:虚拟机自省技术
VM introspection
基于单一CPU架构的静态分析方法使用的特征不包含在其他CPU架构上编译的样本的特征。
基于单一CPU架构的动态分析方法无法运行基于其他CPU架构编译的样本,因此无法获取特征。
因此,跨体系结构的恶意软件检测方法比基于单一CPU体系结构的方法更适合未来的需求。
静态分析不能检测混淆的代码?
2.相关工作
基于静态特征方式:一大包综述
基于动态特征方式:一大包综述
基于混合特征方式:综述三个文章的方法
基于VMI检测的特征:一大包综述
3.方法
3.1 概述