Behavioral Malware Detection in Delay Tolerant Networks
Title | Behavioral Malware Detection in Delay Tolerant Networks |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Wei Peng, Feng Li, Xukai Zou, Jie Wu |
Journal | Parallel and Distributed Systems, IEEE Transactions on |
Volume | 25 |
Pagination | 53-63 |
Date Published | Jan |
ISSN | 1045-9219 |
Keywords | adaptive look ahead, Aging, Bayes methods, Bayesian filtering, Bayesian malware detection, Bayesian methods, behavioral characterization, behavioral malware characterization, Bluetooth, delay tolerant networks, Delay-tolerant networks, delay-tolerant-network model, dogmatic filtering, DTN model, Equations, filtering theory, invasive software, Malware, Mathematical model, mobile radio, modern mobile consumer electronics, naive Bayesian model, obfuscated malware, polymorphic malware, proximity malware, short-range communication technologies, Silicon |
Abstract | The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting botnets. We identify two unique challenges for extending Bayesian malware detection to DTNs ("insufficient evidence versus evidence collection risk" and "filtering false evidence sequentially and distributedly"), and propose a simple yet effective method, look ahead, to address the challenges. Furthermore, we propose two extensions to look ahead, dogmatic filtering, and adaptive look ahead, to address the challenge of "malicious nodes sharing false evidence." Real mobile network traces are used to verify the effectiveness of the proposed methods. |
DOI | 10.1109/TPDS.2013.27 |
Citation Key | 6463391 |
- DTN model
- Silicon
- short-range communication technologies
- proximity malware
- polymorphic malware
- obfuscated malware
- naive Bayesian model
- modern mobile consumer electronics
- mobile radio
- Mathematical model
- malware
- invasive software
- filtering theory
- Equations
- adaptive look ahead
- dogmatic filtering
- delay-tolerant-network model
- Delay-tolerant networks
- delay tolerant networks
- Bluetooth
- behavioral malware characterization
- behavioral characterization
- Bayesian methods
- Bayesian malware detection
- Bayesian filtering
- Bayes methods
- aging