首页> 外文期刊>Future generation computer systems >EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
【24h】

EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats

机译:EsPADA:增强的有效载荷分析仪,可针对恶意威胁进行强大的恶意软件检测

获取原文
获取原文并翻译 | 示例
           

摘要

The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building models of the normal/legitimate activities registered at the protected systems, from them analyzing the incoming observations looking for significant discordances that may reveal misbehaviors. But in the last years, the adversarial machine learning paradigm introduced never-seen-before evasion procedures able to jeopardize the traditional anomaly-based methods, thus entailing one of the major emerging challenges in the cybersecurity landscape. With the aim on contributing to their adaptation against adversarial threats, this paper presents EsPADA (Enhanced Payload Analyzer for malware Detection robust against Adversarial threats), a novel approach built on the grounds of the PAYL sensor family. At the SPARTA Training stage, both normal and adversarial models are constructed according to features extracted by N-gram, which are stored within Counting Bloom Filters (CBF). In this way it is possible to take advantage of both binary-based and spectral-based traffic modeling procedures for malware detection. At Detection stage, the payloads to be analyzed are collected from the protected environment and compared with the usage models previously built at Training. This leads to calculate different scores that allow to discriminate their nature (normal or suspicious) and to assess the labeling coherency, the latest studied for estimating the likelihood of the payload disguising mimicry attacks. The effectiveness of EsPADA was demonstrated on the public datasets DARPA'99 and UCM 2011 by achieving promising preliminarily results.
机译:新兴的通信技术领域已经巩固了基于异常的入侵检测范例,这是能够发现前所未有的恶意特征的最杰出的解决方案之一。它依赖于在受保护系统中注册的正常/合法活动的构建模型,从中分析传入的观察结果,寻找可能揭示不良行为的重大不符之处。但是在过去的几年中,对抗性机器学习范式引入了前所未有的规避程序,能够危及传统的基于异常的方法,从而引发了网络安全领域的主要挑战之一。为了帮助他们适应对抗性威胁,本文介绍了一种基于PAYL传感器家族的新颖方法EsPADA(增强型有效载荷分析器,可对对抗性威胁进行强大的恶意软件检测)。在SPARTA训练阶段,根据N-gram提取的特征构建正常模型和对抗模型,这些特征存储在Counting Bloom Filters(CBF)中。这样,可以利用基于二进制和基于频谱的流量建模过程来进行恶意软件检测。在检测阶段,要从受保护的环境中收集要分析的有效负载,并将其与先前在培训中构建的使用模型进行比较。这导致计算出不同的分数,从而可以区分其性质(正常或可疑)并评估标签的一致性,这是最新研究,用于估计有效载荷掩盖模仿攻击的可能性。通过获得有希望的初步结果,在公共数据集DARPA'99和UCM 2011上证明了EsPADA的有效性。

著录项

  • 来源
    《Future generation computer systems》 |2020年第3期|159-173|共15页
  • 作者

  • 作者单位

    Indra Digital Labs Av. de Bruselas 35 28108 Alcobendas Madrid Spain Department of Software Engineering and Artificial Intelligence (DISIA) School of Computer Science Complutense University of Madrid Calle Profesor Jose Garcia Santesmases 9 Ciudad Universitaria 28040 Madrid Spain;

    Universidad de Lima Avenida Javier Prado Este 4600 Lima Peru;

    Department of Software Engineering and Artificial Intelligence (DISIA) School of Computer Science Complutense University of Madrid Calle Profesor Jose Garcia Santesmases 9 Ciudad Universitaria 28040 Madrid Spain;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Adversarial machine learning; Anomaly recognition; Communication networks; Intrusion detection; Malware;

    机译:对抗机器学习;异常识别;通讯网络;入侵检测;恶意软件;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号