Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection

被引:12
|
作者
He, Zhangying [1 ]
Rezaei, Amin [1 ]
Homayoun, Houman [2 ]
Sayadi, Hossein [1 ]
机构
[1] Calif State Univ, Long Beach, CA 90032 USA
[2] Univ Calif Davis, Davis, CA 95616 USA
来源
PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022 | 2022年
关键词
Deep Learning; Hardware-Based Malware Detection; Machine Learning; Transfer Learning; Zero-Day Attack;
D O I
10.1145/3526241.3530326
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, security researchers have shifted their attentions to the underlying processors' architecture and proposed Hardware-Based Malware Detection (HMD) countermeasures to address inefficiencies of software-based detection methods. HMD techniques apply standard Machine Learning (ML) algorithms to the processors' low-level events collected from Hardware Performance Counter (HPC) registers. However, despite obtaining promising results for detecting known malware, the challenge of accurate zero-day (unknown) malware detection has remained an unresolved problem in existing HPC-based countermeasures. Our comprehensive analysis shows that standard ML classifiers are not effective in recognizing zero-day malware traces using HPC events. In response, we propose Deep-HMD, a two-stage intelligent and flexible approach based on deep neural network and transfer learning, for accurate zero-day malware detection based on image-based hardware events. The experimental results indicate that our proposed solution outperforms existing ML-based methods by achieving a 97% detection rate (F-Measure and Area Under the Curve) for detecting zero-day malware signatures at run-time using the top 4 hardware events with a minimal false positive rate and no hardware redesign overhead.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 50 条
  • [21] A Survey on Hardware-Based Malware Detection Approaches
    Chenet, Cristiano Pegoraro
    Savino, Alessandro
    Di Carlo, Stefano
    IEEE ACCESS, 2024, 12 : 54115 - 54128
  • [22] An adaptable deep learning-based intrusion detection system to zero-day attacks
    Soltani, Mahdi
    Ousat, Behzad
    Siavoshani, Mahdi Jafari
    Jahangir, Amir Hossein
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [23] Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection
    Hindy, Hanan
    Atkinson, Robert
    Tachtatzis, Christos
    Colin, Jean-Noel
    Bayne, Ethan
    Bellekens, Xavier
    ELECTRONICS, 2020, 9 (10) : 1 - 16
  • [24] Hardware-based Workload Forensics and Malware Detection in Microprocessors
    Zhou, Liwei
    Makris, Yiorgos
    2016 17TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST AND VERIFICATION (MTV), 2016, : 45 - 50
  • [25] Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
    Okazaki, Naonobu
    Usuzaki, Shotaro
    Waki, Tsubasa
    Kawagoe, Hyoga
    Park, Mirang
    Yamaba, Hisaaki
    Aburada, Kentaro
    FUTURE INTERNET, 2024, 16 (08)
  • [26] Distributed Detection of Zero-Day Network Traffic Flows
    Miao, Yuantian
    Pan, Lei
    Rajasegarar, Sutharshan
    Zhang, Jun
    Leckie, Christopher
    Xiang, Yang
    DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191
  • [27] PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection
    Won, Dong-Ok
    Jang, Yong-Nam
    Lee, Seong-Whan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 82 - 94
  • [28] Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities
    Barros, Pedro H.
    Chagas, Eduarda T. C.
    Oliveira, Leonardo B.
    Queiroz, Fabiane
    Ramos, Heitor S.
    COMPUTERS & SECURITY, 2022, 120
  • [29] Zero-day Malware Detection using Threshold-free Autoencoding Architecture
    Kim, Chiho
    Chang, Sang-Yoon
    Kim, Jonghyun
    Lee, Dongeun
    Kim, Jinoh
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 1279 - 1284
  • [30] Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach
    Kumar, Rajesh
    Subbiah, Geetha
    SENSORS, 2022, 22 (07)