These labels were automatically added by AI and may be inaccurate. For details, see About Literature Database.
Abstract
In the current cybersecurity landscape, protecting military devices such as
communication and battlefield management systems against sophisticated cyber
attacks is crucial. Malware exploits vulnerabilities through stealth methods,
often evading traditional detection mechanisms such as software signatures. The
application of ML/DL in vulnerability detection has been extensively explored
in the literature. However, current ML/DL vulnerability detection methods
struggle with understanding the context and intent behind complex attacks.
Integrating large language models (LLMs) with system call analysis offers a
promising approach to enhance malware detection. This work presents a novel
framework leveraging LLMs to classify malware based on system call data. The
framework uses transfer learning to adapt pre-trained LLMs for malware
detection. By retraining LLMs on a dataset of benign and malicious system
calls, the models are refined to detect signs of malware activity. Experiments
with a dataset of over 1TB of system calls demonstrate that models with larger
context sizes, such as BigBird and Longformer, achieve superior accuracy and
F1-Score of approximately 0.86. The results highlight the importance of context
size in improving detection rates and underscore the trade-offs between
computational complexity and performance. This approach shows significant
potential for real-time detection in high-stakes environments, offering a
robust solution to evolving cyber threats.
External Datasets
MalwSpecSys
References
Acta Polytechnica Hungarica
Cyber threats and cyber deception in hybrid warfare
William Steingartner, Darko Galinec
Published: 2021
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM)
When autonomous intelligent goodware will fight autonomous intelligent malware: A possible future of cyber defense
Paul Theron, Alxander Kott
Published: 2019
Nature Machine Intelligence
Trusting artificial intelligence in cybersecurity is a double-edged sword
Mariarosaria Taddeo, Tom McCutcheon, Luciano Floridi
Published: 2019
Journal of Big data
Cybersecurity data science: an overview from machine learning perspective
I. H. Sarker, A. Kayes, S. Badsha, H. Alqahtani, P. Watters, A. Ng
Malwspecsys: A dataset containing syscalls of an iot spectrum sensor affected by heterogeneous malware
Ramon Solo de Zaldivar, Alberto Huertas Celdran, Jan von der Assen, Pedro Miguel Sanchez Sánchez, Gérôme Bovet, Gregorio Martínez Perez, Burkhard Stiller
Published: 2022
2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)
Sequencegram: n-gram modeling of system calls for program based anomaly detection
Neminath Hubballi, Santosh Biswas, Sukumar Nandi
Published: 2011
Electronics
Malgra: Machine learning and n-gram malware feature extraction and detection system
Muhammad Ali, Stavros Shiaeles, Gueltoum Bendiab, Bogdan Ghita
Published: 2020
IEEE Internet of Things Journal
Privacy-preserving and syscall-based intrusion detection system for iot spectrum sensors affected by data falsification attacks
Alberto Huertas Celdran, Pedro Miguel Sánchez Sánchez, Chao Feng, Gérôme Bovet, Gregorio Martínez Perez, Burkhard Stiller