AdaTrans: An adaptive transformer for IoT Malware detection based on sensitive API call graph and inter-component communication analysis

Author:

Pi Feng1,Tian Shengwei2,Pei Xinjun23,Chen Peng1,Wang Xin1,Wang Xiaowei1

Affiliation:

1. Xinjiang General Station of Exit and Entry Frontier Inspection, Urumqi, China

2. School of Software, Xinjiang University, Wulumuqi, China

3. School of Computer Science and Engineering, Central South Univerisity, Changsha, China

Abstract

With the development of the Internet of Things (IoT), mobile devices are playing an increasingly important role in our daily lives. There are various malware threats present in these mobile devices, which can steal users’ personal information. Some malware exploits Inter-Component Communication (ICC) to execute malicious activities for unauthorized data access and system control, enabling communication between different components within an app and between different apps. In this paper, we propose an Adaptive Transformer-based malware framework (named AdaTrans) that combines sensitive Application Programming Interface (API)- and ICC-related features. The framework first extracts sensitive function call subgraphs (SFCS) to reflect the caller-callee relationships, and then utilizes ICC interactions to reveal hidden communication patterns in malicious activities. Moreover, we propose a novel adaptive Transformer model to detect malicious behaviors. We evaluate our framework on real-world datasets and demonstrate that AdaTrans consistently outperforms other existing state-of-the-art systems.

Publisher

IOS Press

Subject

Artificial Intelligence,General Engineering,Statistics and Probability

Reference27 articles.

1. Physical Security and Safety of IoT Equipment:A Survey of Recent Advances and Opportunities;Xing Yang;IEEE Trans. Ind. Informatics,2022

2. Design and Implementation of an ML and IoT BasedAdaptive Traffic-Management System for Smart Cities;Umesh Kumar Lilhore;Sensors,2022

3. A Survey of IoT Applications in Blockchain Systems:Architecture, Consensus, and Traffic Modeling;Laphou Lao;ACM Comput.Surv.,2021

4. Asurvey of adversarial attack and defense methods for malwareclassification in cyber security;Senming Yan;IEEE Commun. Surv. Tutorials,2023

5. Smart IoT and machine learning-basedframework for water quality assessment and device componentmonitoring;Bhardwaj;Environmental Science and Pollution Research,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3