首页> 外文会议>International Symposium on Quality Electronic Design >When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection
【24h】

When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection

机译:当机器学习符合硬件网络安全时:深入计入准确的零恶意软件检测

获取原文

摘要

Cybersecurity for the past decades has been in the front line of global attention as a critical threat to the information technology infrastructures. According to recent security reports, malicious software (a.k.a. malware) is rising at an alarming rate in numbers as well as harmful purposes to compromise security of computing systems. To address the high complexity and computational overheads of conventional software-based detection techniques, Hardware-Supported Malware Detection (HMD) has proved to be efficient for detecting malware at the processors’ microarchitecture level with the aid of Machine Learning (ML) techniques applied on Hardware Performance Counter (HPC) data. Existing ML-based HMDs while accurate in recognizing known signatures of malicious patterns, have not explored detecting unknown (zero-day) malware data at run-time which is a more challenging problem, since its HPC data does not match any known attack applications’ signatures in the existing database. In this work, we first present a review of recent ML-based HMDs utilizing built-in HPC registers information. Next, we examine the suitability of various standard ML classifiers for zero-day malware detection and demonstrate that such methods are not capable of detecting unknown malware signatures with high detection rate. Lastly, to address the challenge of run-time zero-day malware detection, we propose an ensemble learning-based technique to enhance the performance of the standard malware detectors despite using a small number of microarchitectural features that are captured at run-time by existing HPCs. The experimental results demonstrate that our proposed approach by applying AdaBoost ensemble learning on Random Forrest classifier as a regular classifier achieves 92% F-measure and 95% TPR with only 2% false positive rate in detecting zero-day malware using only the top 4 microarchitectural features.
机译:过去几十年的网络安全一直是全球关注的前线,作为对信息技术基础设施的关键威胁。根据最近的安全报告,恶意软件(A.K.A.恶意软件)以令人令人担忧的速度升高以及有害目的,以损害计算系统的安全性。为了解决常规的基于软件的检测技术的高复杂性和计算开销,已经证明了硬件支持的恶意软件检测(HMD)借助于应用于机器学习(ML)技术来检测处理器微体系结构的恶意软件。硬件性能计数器(HPC)数据。基于ML的HMDS准确识别出了恶意模式的已知签名,尚未探索在运行时检测到一个更具挑战性的运行时的未知(零日)恶意软件数据,因为其HPC数据与任何已知的攻击应用程序不匹配现有数据库中的签名。在这项工作中,我们首先介绍了利用内置HPC寄存器信息的基于ML的HMDS审查。接下来,我们检查各种标准ML分类器的适用性进行零日恶意软件检测,并证明这种方法不能检测到具有高检测率的未知恶意软件签名。最后,为了解决运行时间零日恶意软件检测的挑战,我们提出了一种基于集学习的技术,尽管使用现有的运行时捕获的少量微型架构功能,但是尽管使用少量的微架构功能,以增强标准恶意软件探测器的性能。 HPCS。实验结果表明,我们通过将Adaboost集合学习应用于随机的Forrest分类器作为常规分类器来实现92%的F-Measure和95%TPR,仅使用前4个微架构检测零天性软件2%的假阳性率。特征。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号