4.7 Article

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning

Journal

COMPUTER NETWORKS
Volume 198, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.comnet.2021.108394

Keywords

Malware detection; Virtualization; Deep learning; Intel processor trace; Control flow

Funding

  1. Strategic Priority Research Program of Chinese Academy of Sciences [XDC02010900]
  2. National Key Research and Development Program of China [2016QY04W0 903]
  3. Beijing Municipal Science and Technology Commission [Z191100007119010]
  4. National Natural Science Foundation of China [61772078, 61602035]
  5. CCF-NSFOCUS Kun-Peng Scientific Research Foundation
  6. Open Found of Shanxi Military and Civilian Integration Software Engineering Technology Research Center

Ask authors/readers for more resources

With the rise of cloud computing, virtualization security has become increasingly important. To defend against malware attacks in the cloud, researchers have proposed virtualization-based malware detection solutions. One novel method called MDCHD utilizes deep learning and Lamport's ring buffer algorithm to achieve acceptable detection accuracy with minimal performance cost.
With the development of cloud computing, more and more enterprises and institutes have deployed important computing tasks and data into virtualization environments. Virtualization security has become very important for cloud computing. When an attacker controls a victim's virtual machine, he (or she) may launch malware for malicious purpose in that virtual machine. To defend against malware attacks in the cloud, many virtualizationbased approaches are proposed. However, the existing methods suffer from limitations in terms of transparency and performance cost. To address these issues, we propose MDCHD, a novel malware detection solution for virtualization environments. This method first utilizes the Intel Processor Trace (IPT) mechanism to collect the run-time control flow information of the target program. Then, it converts the control flow information into color images. By doing so, we can utilize a CNN-based deep learning method to identify malware from the images. To improve the performance of our detection mechanism, we leverage Lamport's ring buffer algorithm. In this way, the control flow information collector and security checker can work concurrently. The evaluation shows that our approach can achieve acceptable detection accuracy with a minimal performance cost.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available