TY - JOUR
T1 - A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT
AU - Niu, Zequn
AU - Xue, Jingfeng
AU - Qu, Dacheng
AU - Wang, Yong
AU - Zheng, Jun
AU - Zhu, Hongfei
N1 - Publisher Copyright:
© 2022
PY - 2022/7
Y1 - 2022/7
N2 - The continuous emergence of new malware has been a severe threat to Industrial Internet of Things (IIoT), while identifying malware through detecting malicious traffic in encrypted, drift, and imbalanced traffic streams is a challenge. This paper proposes an approach based on adaptive online analysis to accurately determine the families of malware by analyzing traffic streams which are encrypted, drift, and imbalanced. This approach is based on Improved Adaptive Random Forests (IARF), to obtain the ability of adaptive update of parameters when processing new types of malware traffic in traffic streams and being sensitive to families of malware with few samples in imbalanced traffic. We build a prototype of this approach and evaluate the performance through experiments. The experiments are based on a mixed dataset composed of data from malware-traffic-analysis.net, Lastline Inc, MCFP dataset, and CTU-13 dataset. In addition, our approach is also compared with three state-of-the-art methods. The results of the experiments show that we have obtained a 99.66% F1-score in the classification of malware families, and our classifier also performs better than the other classifiers.
AB - The continuous emergence of new malware has been a severe threat to Industrial Internet of Things (IIoT), while identifying malware through detecting malicious traffic in encrypted, drift, and imbalanced traffic streams is a challenge. This paper proposes an approach based on adaptive online analysis to accurately determine the families of malware by analyzing traffic streams which are encrypted, drift, and imbalanced. This approach is based on Improved Adaptive Random Forests (IARF), to obtain the ability of adaptive update of parameters when processing new types of malware traffic in traffic streams and being sensitive to families of malware with few samples in imbalanced traffic. We build a prototype of this approach and evaluate the performance through experiments. The experiments are based on a mixed dataset composed of data from malware-traffic-analysis.net, Lastline Inc, MCFP dataset, and CTU-13 dataset. In addition, our approach is also compared with three state-of-the-art methods. The results of the experiments show that we have obtained a 99.66% F1-score in the classification of malware families, and our classifier also performs better than the other classifiers.
KW - Adaptive random forests
KW - Encrypted traffic
KW - IIoT
KW - Malware
KW - Online learning
UR - http://www.scopus.com/inward/record.url?scp=85128270861&partnerID=8YFLogxK
U2 - 10.1016/j.ins.2022.04.018
DO - 10.1016/j.ins.2022.04.018
M3 - Article
AN - SCOPUS:85128270861
SN - 0020-0255
VL - 601
SP - 162
EP - 174
JO - Information Sciences
JF - Information Sciences
ER -