Mason Archival Repository Service

Malware Detection in Internet of Things Using Opcodes and Machine Learning

Show simple item record

dc.contributor.advisor Sasan, Avesta
dc.contributor.author Khare, Aditi Atul
dc.creator Khare, Aditi Atul
dc.date 2020-12-04
dc.date.accessioned 2021-09-28T01:04:47Z
dc.date.available 2021-09-28T01:04:47Z
dc.identifier.uri http://hdl.handle.net/1920/12075
dc.description.abstract In the recent years, the exponential growth of Internet of Things devices has caused a huge security threat. These devices are being deployed even before being secured. Most of the IoT devices are either unsecured or weakly secured and attackers are taking advantage of this. Even if one IoT device gets infected, it has the potential to spread the malware to the entire network. Obfuscation techniques like polymorphism are being used by hackers to avoid detection. This research is focused on polymorphic malware detection in Internet of Things networks using opcodes and machine learning. ARM-based malware was used for testing because of the large share of ARM-based IoT platforms making it more indictive of real-world attacks. Opcodes were extracted by disassembling the dataset using the IDA Pro disassembler. A sequentially ordered dataset of the opcodes was created to be used for detection. Four different datasets namely Dmalware, Dgoodware, Dunseenmalware and Dunseengoodware were created. A polymorphed version of the unseen malware dataset was also created to test the utility of the approach in polymorphic malware detection. We used the sequential pattern mining algorithm, Mind the Gap: Frequent Sequence Mining, to mine the most frequent patterns in malware. These Maximal Sequential Patterns aka MSPs were categorized based on their functionality using ARM resources. Three different approaches were tested and compared. The first approach was to create an opcode-rank dictionary based on opcode frequency in the malware dataset to create vectors for machine learning classification. The second approach used the frequency of MSPs to vectorize the given dataset while the third approach used the MSP type as a feature for detection. Machine learning classifiers like Decision tree, KNN, Random-Forest, SVM and AdaBoost were used to detect malware as well as polymorphic malware. It was observed that the sequential pattern mining approaches were faster and more resilient to polymorphed malware. A comparative study showed that the MSP list approach has comparable performance to the MSP type approach. Also, the MSP list approach has faster pre-processing runtimes and lower memory usage making it a viable approach for classification of malware. en_US
dc.language.iso en en_US
dc.subject Malware Detection en_US
dc.subject Sequential Pattern Mining en_US
dc.subject Polymorphic malware en_US
dc.subject Malware in Internet of Things en_US
dc.title Malware Detection in Internet of Things Using Opcodes and Machine Learning en_US
dc.type Thesis en_US
thesis.degree.name Master of Science in Computer Engineering en_US
thesis.degree.level Master's en_US
thesis.degree.discipline Computer Engineering en_US
thesis.degree.grantor George Mason University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search MARS


Browse

My Account

Statistics