The College of Software, Xinjiang University, Urumqi 830046, China.
Sensors (Basel). 2023 Mar 13;23(6):3060. doi: 10.3390/s23063060.
With the development of internet technology, the Internet of Things (IoT) has been widely used in several aspects of human life. However, IoT devices are becoming more vulnerable to malware attacks due to their limited computational resources and the manufacturers' inability to update the firmware on time. As IoT devices are increasing rapidly, their security must classify malicious software accurately; however, current IoT malware classification methods cannot detect cross-architecture IoT malware using system calls in a particular operating system as the only class of dynamic features. To address these issues, this paper proposes an IoT malware detection approach based on PaaS (Platform as a Service), which detects cross-architecture IoT malware by intercepting system calls generated by virtual machines in the host operating system acting as dynamic features and using the K Nearest Neighbors (KNN) classification model. A comprehensive evaluation using a 1719 sample dataset containing ARM and X86-32 architectures demonstrated that MDABP achieves 97.18% average accuracy and a 99.01% recall rate in detecting samples in an Executable and Linkable Format (ELF). Compared with the best cross-architecture detection method that uses network traffic as a unique type of dynamic feature with an accuracy of 94.5%, practical results reveal that our method uses fewer features and has higher accuracy.
随着互联网技术的发展,物联网在人类生活的多个方面得到了广泛的应用。然而,由于物联网设备的计算资源有限,制造商无法及时更新固件,因此它们更容易受到恶意软件的攻击。随着物联网设备的迅速增加,必须对恶意软件进行准确分类;但是,目前的物联网恶意软件分类方法无法检测特定操作系统中的系统调用作为唯一一类动态特征的跨架构物联网恶意软件。针对这些问题,本文提出了一种基于 PaaS(平台即服务)的物联网恶意软件检测方法,该方法通过拦截主机操作系统中虚拟机生成的系统调用作为动态特征,并使用 K 最近邻(KNN)分类模型来检测跨架构物联网恶意软件。使用包含 ARM 和 X86-32 架构的 1719 个样本数据集进行的全面评估表明,MDABP 在以可执行和链接格式(ELF)检测样本时,平均准确率达到 97.18%,召回率达到 99.01%。与使用网络流量作为唯一类型的动态特征且准确率为 94.5%的最佳跨架构检测方法相比,实际结果表明,我们的方法使用的特征更少,准确率更高。