论文标题
用于开发基于硬件的网络安全对策的机器学习算法的全面效率分析
Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity Countermeasures
论文作者
论文摘要
现代计算系统使网络对手比以前在技术初期提供的更复杂的恶意软件创造了更复杂的恶意软件。基于基于签名的方法的过时的检测技术,例如反病毒软件(AVS),无法再满足计算机系统所需的需求。现代恶意软件的复杂性导致了当代检测技术的开发,这些技术使用机器学习领域和硬件来提高恶意软件的检测率。这些新技术使用构成数字签名的硬件性能计数器(HPC)。在培养培训数据后,他们可以参考这些HPC来对零日恶意软件样本进行分类。当没有可比HPC值的恶意软件与这些新技术接触时,就会出现问题。我们提供了几种机器学习和深度学习模型的分析,这些模型运行零日样本,并评估C ++算法转换为硬件说明语言(HDL)的结果,用于开始硬件实现。当运行零日恶意软件数据作为我们的最高检测器,决策树时,我们的结果缺乏准确性,只能达到91.2%的准确性,而决策树的形式的F1分数为91.5%。接下来,通过接收器操作曲线(ROC)和面积曲线(AUC),我们还可以确定该算法没有明显的鲁棒性,因为最大的AUC仅为0.819。此外,我们为集合学习算法的开销相对较高,同时仅具有86.3%的精度和86%的F1得分。最后,作为另一项任务,我们对一条规则算法进行了调整,以适合许多规则,以使日常用户可以理解恶意软件分类,从而使他们能够查看法规,同时保持相对较高的精度。
Modern computing systems have led cyber adversaries to create more sophisticated malware than was previously available in the early days of technology. Dated detection techniques such as Anti-Virus Software (AVS) based on signature-based methods could no longer keep up with the demand that computer systems required of them. The complexity of modern malware has led to the development of contemporary detection techniques that use the machine learning field and hardware to boost the detection rates of malicious software. These new techniques use Hardware Performance Counters (HPCs) that form a digital signature of sorts. After the models are fed training data, they can reference these HPCs to classify zero-day malware samples. A problem emerges when malware with no comparable HPC values comes into contact with these new techniques. We provide an analysis of several machine learning and deep learning models that run zero-day samples and evaluate the results from the conversion of C++ algorithms to a hardware description language (HDL) used to begin a hardware implementation. Our results present a lack of accuracy from the models when running zero-day malware data as our highest detector, decision tree, was only able to reach 91.2% accuracy and had an F1-Score of 91.5% in the form of a decision tree. Next, through the Receiver Operating Curve (ROC) and area-under-the-curve (AUC), we can also determine that the algorithms did not present significant robustness as the largest AUC was only 0.819. In addition, we viewed relatively high overhead for our ensemble learning algorithm while also only having an 86.3% accuracy and 86% F1-Score. Finally, as an additional task, we adapted the one rule algorithm to fit many rules to make malware classification understandable to everyday users by allowing them to view the regulations while maintaining relatively high accuracy.