Skip to main content

Lightweight IoT Malware Visualization Analysis via Two-Bits Networks

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

Internet of Things (IoT) devices are typically resource constrained micro-computers for domain-specific computations. Most of them use low-cost embedded system that lacked basic security monitoring and protection mechanisms. Consequently, IoT-specific malwares are made to target at these vulnerable devices for deep infection and utilization, such as Mirai and Brickerbot, which poses tremendous threats to the security of IoT. In this issue, we present a novel approach for detecting malware in IoT environments. The proposed method firstly extract one-channel gray-scale image sequence that converted from the disassembled malware binaries. Then we utilize a Two-Bits Convolutional Neural Network (TBN) for detecting IoT malware families, which can encode the network edge weights with two bits. Experimental results conducted on the collected dataset show that our approach can reduce the memory usage and improve computational efficiency significantly while achieving a considerable performance in terms of malware detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: Proceedings of the IEEE Symposium on Security and Privacy (2007)

    Google Scholar 

  2. Anderson, B., Storlie, C., Yates, M., Mcphall, A.: Automating reverse engineering with machine learning techniques (2014)

    Google Scholar 

  3. Ahmadi, M., Giacinto, G., Ulyanov, D., Semenov, S., Trofimov, M.: Novel feature extraction, selection and fusion for effective malware family classification. In: ACM Conference on Data and Application Security and Privacy (2016)

    Google Scholar 

  4. Su, J., Vargas, D.V., Prasad, S., Sgandurra, D., Feng, Y., Sakurai, K.: Lightweight classification of IOT malware based on image recognition (2018)

    Google Scholar 

  5. Zhang, J., Zheng, Q., Hui, Y., Lu, O., Hu, Y.: Malware variant detection using opcode image recognition with small training sets. In: International Conference on Computer Communication and Networks (2016)

    Google Scholar 

  6. Liu, L., Wang, B.: Malware classification using gray-scale images and ensemble learning. In: International Conference on Systems and Informatics (2017)

    Google Scholar 

  7. Han, K.S., Lim, J.H., Kang, B., Im, E.G.: Malware analysis using visualized images and entropy graphs. Int. J. Inf. Secur. 14(1), 1–14 (2015)

    Google Scholar 

  8. Nataraj, L., Yegneswaran, V., Porras, P., Jian, Z.: A comparative assessment of malware classification using binary texture analysis and dynamic analysis. In: ACM Workshop on Security and Artificial Intelligence (2011)

    Google Scholar 

  9. Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security (2011)

    Google Scholar 

  10. Kirat, D., Nataraj, L., Vigna, G., Manjunath, B.S.: Sigmal: a static signal processing based malware triage. In: Computer Security Applications Conference (2013)

    Google Scholar 

  11. Raff, E., Barker, J., Sylvester, J., Brandon, R., Nicholas, C.: Malware detection by eating a whole EXE (2017)

    Google Scholar 

  12. Yue, S.: Imbalanced malware images classification: a CNN based approach (2017)

    Google Scholar 

Download references

Acknowledgement

This work was partially supported by the National Key R&D Program of China (2018YFC1201102), National Natural Science Foundation of China (61802016, U1636120), China Postdoctoral Science Foundation (2018M641198), and the National Social Science Foundation of China (17ZDA331).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongsong Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wen, H., Zhang, W., Hu, Y., Hu, Q., Zhu, H., Sun, L. (2019). Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics