首页> 外文会议>ACM/ESDA/IEEE Design Automation Conference >Ensemble Learning for Effective Run-Time Hardware-Based Malware Detection: A Comprehensive Analysis and Classification
【24h】

Ensemble Learning for Effective Run-Time Hardware-Based Malware Detection: A Comprehensive Analysis and Classification

机译:合奏学习有效运行时硬件的恶意软件检测:全面分析和分类

获取原文

摘要

Malware detection at the hardware level has emerged recently as a promising solution to improve the security of computing systems. Hardware-based malware detectors take advantage of Machine Learning (ML) classifiers to detect pattern of malicious applications at run-time. These ML classifiers are trained using low-level features such as processor Hardware Performance Counters (HPCs) data which are captured at run-time to appropriately represent the application behaviour. Recent studies show the potential of standard ML-based classifiers for detecting malware using analysis of large number of microarchitectural events, more than the very limited number of HPC registers available in today's microprocessors which varies from 2 to 8. This results in executing the application more than once to collect the required data, which in turn makes the solution less practical for effective run-time malware detection. Our results show a clear trade-off between the performance of standard ML classifiers and the number and diversity of HPCs available in modern microprocessors. This paper proposes a machine learning-based solution to break this trade-off to realize effective run-time detection of malware. We propose ensemble learning techniques to improve the performance of the hardware-based malware detectors despite using a very small number of microarchitectural events that are captured at run-time by existing HPCs, eliminating the need to run an application several times. For this purpose, eight robust machine learning models and two well-known ensemble learning classifiers applied on all studied ML models (sixteen in total) are implemented for malware detection and precisely compared and characterized in terms of detection accuracy, robustness, performance (accuracy × robustness), and hardware overheads. The experimental results show that the proposed ensemble learning-based malware detection with just 2 HPCs using ensemble technique outperforms standard classifiers with 8 HPCs by up to 17%. In addition, it can match the robustness and performance of standard ML-based detectors with 16 HPCs while using only 4 HPCs allowing effective run-time detection of malware.
机译:最近,硬件级别的恶意软件检测是提高计算系统安全性的有希望的解决方案。基于硬件的恶意软件探测器利用机器学习(ML)分类器来检测运行时的恶意应用模式。这些ML分类器使用低级功能训练,例如处理器硬件性能计数器(HPC)数据在运行时捕获,以适当地表示应用程序行为。最近的研究表明,使用大量微架构事件的分析来检测恶意软件的标准ML的分类器的潜力,超过当今微处理器中可用的非常有限数量的HPC寄存器,从2到8中变化。这导致更多地执行应用程序超过一次收集所需的数据,这反过来使解决方案不太实用用于有效的运行时间恶意软件检测。我们的结果表明,在现代微处理器中可用的标准ML分类器的性能和HPC的数量和多样性之间表现出明确的权衡。本文提出了一种基于机器学习的解决方案,可以打破这种权衡来实现恶意软件的有效运行时间检测。我们提出了Ensemble学习技术,以提高基于硬件的恶意软件探测器的性能,尽管使用现有HPC在运行时捕获的非常少量的微架构事件,请消除需要多次运行应用程序的需要。为此目的,为恶意软件检测实施了八种强大的机器学习模型和应用于所有研究的ML型号(总共十六个)(总共十六个)(总共十六分),并且在检测精度,鲁棒性,性能(精度×鲁棒性)和硬件开销。实验结果表明,基于集合的基于学习的恶意软件检测,使用集合技术只有2个HPC,优于8个HPC的标准分类器,最多17 %。此外,它可以匹配标准ML的探测器的鲁棒性和性能,其中包含16个HPC,而仅使用4个HPC,允许有效地检测恶意软件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号