Big Data Framework for Zero-Day Malware Detection

被引:16
|
作者
Gupta, Deepak [1 ]
Rani, Rinkle [1 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Apache Spark; big data; machine learning; malware detection; MLlib;
D O I
10.1080/01969722.2018.1429835
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware has already been recognized as one of the most dominant cyber threats on the Internet today. It is growing exponentially in terms of volume, variety, and velocity, and thus overwhelms the traditional approaches used for malware detection and classification. Moreover, with the advent of Internet of Things, there is a huge growth in the volume of digital devices and in such scenario, malicious binaries are bound to grow even faster making it a big data problem. To analyze and detect unknown malware on a large scale, security analysts need to make use of machine learning algorithms along with big data technologies. These technologies help them to deal with current threat landscape consisting of complex and large flux of malicious binaries. This paper proposes the design of a scalable architecture built on the top of Apache Spark which uses its scalable machine learning library (MLlib) for detecting zero-day malware. The proposed platform is tested and evaluated on a dataset comprising of 0.2 million files consisting of 0.05 million clean files and 0.15 million malicious binaries covering a large number of malware families over a period of 7 years starting from 2010.
引用
收藏
页码:103 / 121
页数:19
相关论文
共 50 条
  • [31] Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection
    He, Zhangying
    Rezaei, Amin
    Homayoun, Houman
    Sayadi, Hossein
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 27 - 32
  • [32] An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
    Albanese, Massimiliano
    Jajodia, Sushil
    Singhal, Anoop
    Wang, Lingyu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 322 - 340
  • [33] Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities
    Barros, Pedro H.
    Chagas, Eduarda T. C.
    Oliveira, Leonardo B.
    Queiroz, Fabiane
    Ramos, Heitor S.
    COMPUTERS & SECURITY, 2022, 120
  • [34] A framework for detecting zero-day exploits in network flows
    Toure, Almamy
    Imine, Youcef
    Semnont, Alexis
    Delot, Thierry
    Gallais, Antoine
    COMPUTER NETWORKS, 2024, 248
  • [35] A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
    Liu, Wenyan
    Chen, Fucai
    Hu, Hongchao
    Cheng, Guozhen
    Huo, Shumin
    Liang, Hao
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 50 - 53
  • [36] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557
  • [37] The Zero-Day Salesmen
    Greenberg, Andy
    FORBES, 2012, 189 (06): : 40 - +
  • [38] Image-Based Zero-Day Malware Detection in IoMT Devices: A Hybrid AI-Enabled Method
    He, Zhangying
    Sayadi, Hossein
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 82 - 89
  • [39] A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes
    Chen Ting
    Zhang Xiaosong
    Liu Zhi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 45 - 49
  • [40] Distributed Detection of Zero-Day Network Traffic Flows
    Miao, Yuantian
    Pan, Lei
    Rajasegarar, Sutharshan
    Zhang, Jun
    Leckie, Christopher
    Xiang, Yang
    DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191