Low-Complexity Signature-Based Malware Detection for IoT Devices

作者: Muhamed Fauzi Bin Abbas , Thambipillai Srikanthan

DOI: 10.1007/978-981-10-5421-1_15

关键词:

摘要: The ominous threat from malware in critical systems has forced system designers to include detection techniques their ensure a timely response. However, the widely used signature-based implemented detect multitude of potential these also leads large non-functional overhead. Such methods do not lend well extremely resource constrained IoT devices. Hence, this paper, we propose low complexity method for devices that only identifies and stores subset signatures group instead storing separate signature every malware, as done existing work. Experimental results show proposed approach can still achieve 100% rate while relying on very number detection.

参考文章(22)
Zulaiha Ali Othman, Azuraliza Abu Bakar, Intesar Etubal, Improving signature detection classification model using features selection based on customized features intelligent systems design and applications. pp. 1026- 1031 ,(2010) , 10.1109/ISDA.2010.5687051
S. Nari, A. A. Ghorbani, Automated malware classification based on network behavior 2013 International Conference on Computing, Networking and Communications (ICNC). pp. 642- 647 ,(2013) , 10.1109/ICCNC.2013.6504162
Ekta Gandotra, Divya Bansal, Sanjeev Sofat, Malware Analysis and Classification: A Survey Journal of Information Security. ,vol. 5, pp. 56- 64 ,(2014) , 10.4236/JIS.2014.52006
Deguang Kong, Guanhua Yan, Discriminant malware distance learning on structural information for automated malware classification knowledge discovery and data mining. pp. 1357- 1365 ,(2013) , 10.1145/2487575.2488219
Ivan Firdausi, Charles lim, Alva Erwin, Anto Satriyo Nugroho, Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection international conference on advances in computing, control, and telecommunication technologies. pp. 201- 203 ,(2010) , 10.1109/ACT.2010.33
Gérard Wagener, Radu State, Alexandre Dulaunoy, Malware behaviour analysis Journal in Computer Virology. ,vol. 4, pp. 279- 287 ,(2008) , 10.1007/S11416-007-0074-9
Andreas Moser, Christopher Kruegel, Engin Kirda, Exploring Multiple Execution Paths for Malware Analysis ieee symposium on security and privacy. pp. 231- 245 ,(2007) , 10.1109/SP.2007.17
R. Tian, L.M. Batten, S.C. Versteeg, Function length as a tool for malware classification international conference on malicious and unwanted software. pp. 69- 76 ,(2008) , 10.1109/MALWARE.2008.4690860
Deguang Kong, Guanhua Yan, Discriminant malware distance learning on structuralinformation for automated malware classification Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems - SIGMETRICS '13. ,vol. 41, pp. 347- 348 ,(2013) , 10.1145/2465529.2465531
Mehryar Rahmatian, Hessam Kooti, Ian G. Harris, Elaheh Bozorgzadeh, Hardware-Assisted Detection of Malicious Software in Embedded Systems IEEE Embedded Systems Letters. ,vol. 4, pp. 94- 97 ,(2012) , 10.1109/LES.2012.2218630