TY - JOUR
T1 - IIoT Deep Malware Threat Hunting
T2 - From Adversarial Example Detection to Adversarial Scenario Detection
AU - Esmaeili, Bardia
AU - Azmoodeh, Amin
AU - Dehghantanha, Ali
AU - Zolfaghari, Behrouz
AU - Karimipour, Hadis
AU - Hammoudeh, Mohammad
N1 - Publisher Copyright:
IEEE
PY - 2022
Y1 - 2022
N2 - Protecting widely-used deep classifiers against black-box adversarial attacks is a recent research challenge in many security-related areas, including malware classification. This class of attacks relies on optimizing a sequence of highly similar queries to bypass given classifiers. In this paper, we leverage this property and propose a history-based method named, Stateful Query Analysis (SQA), which analyzes sequences of queries received by a malware classifier to detect black-box adversarial attacks on an Industrial Internet of Things (IIoT).In the SQA pipeline, there are two components, namely the similarity encoder and the classifier, both based on Convolutional Neural Networks (CNNs). Unlike state-of-the-art methods, which aim to identify individual adversarial examples, tracking the history of queries allows our method to identify adversarial scenarios and abort attacks before their completion. We optimize SQA using different combinations of hyperparameters on an ARM-based IIoT malware dataset, widely adopted for malware threat hunting in Industry 4.0.
AB - Protecting widely-used deep classifiers against black-box adversarial attacks is a recent research challenge in many security-related areas, including malware classification. This class of attacks relies on optimizing a sequence of highly similar queries to bypass given classifiers. In this paper, we leverage this property and propose a history-based method named, Stateful Query Analysis (SQA), which analyzes sequences of queries received by a malware classifier to detect black-box adversarial attacks on an Industrial Internet of Things (IIoT).In the SQA pipeline, there are two components, namely the similarity encoder and the classifier, both based on Convolutional Neural Networks (CNNs). Unlike state-of-the-art methods, which aim to identify individual adversarial examples, tracking the history of queries allows our method to identify adversarial scenarios and abort attacks before their completion. We optimize SQA using different combinations of hyperparameters on an ARM-based IIoT malware dataset, widely adopted for malware threat hunting in Industry 4.0.
KW - Adversarial Detection
KW - Convolutional Neural Networks
KW - Feature extraction
KW - Gray-scale
KW - Industrial Internet of Things
KW - Industrial Internet of Things
KW - Industry 40
KW - Informatics
KW - Malware
KW - Malware Classification
KW - Malware Threat Hunting
KW - Mathematical models
KW - Training
UR - http://www.scopus.com/inward/record.url?scp=85128656203&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85128656203&partnerID=8YFLogxK
U2 - 10.1109/TII.2022.3167672
DO - 10.1109/TII.2022.3167672
M3 - Article
AN - SCOPUS:85128656203
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
SN - 1551-3203
ER -