A Backdoor Detection Method for Intelligent Terminal in Modern Power System

XIE Xuanxuan, LI Jun’e, LI Fuyang, XU Yifan, LIU Linbin, CHEN Jinshan

Electric Power Construction ›› 2024, Vol. 45 ›› Issue (1) : 45-55.

PDF(2278 KB)
PDF(2278 KB)
Electric Power Construction ›› 2024, Vol. 45 ›› Issue (1) : 45-55. DOI: 10.12204/j.issn.1000-7229.2024.01.005
Smart Grid

A Backdoor Detection Method for Intelligent Terminal in Modern Power System

Author information +
History +

Abstract

In the modern power system, the large-scale access of distributed energy enlarges system exposed surface, and making backdoors of intelligent terminal easy to be exploited by attackers. Therefore, the paper proposes an intelligent terminal backdoor detection method for modern power system. Firstly, the abnormal behavior and its code characteristics are analyzed and summarized, and then backdoors static detection method for intelligent terminal is proposed from two aspects: character string and function call sequence. Secondly, according to characteristic of intelligent terminal function behavior fixed, a dynamic detection method based on system running state is proposed from three aspects: file state, network state and hidden behavior. Detection accuracy can be further improved by dynamically detecting malicious behaviors of backdoors. The experimental results show that the backdoor detection method proposed can effectively discover backdoor code and behavior of power intelligent terminal, detection accuracy is 98.5%, false positive rate is 0.8%.

Key words

rnodern power system / intelligent terminal / backdoor detection / code characteristic / running state

Cite this article

Download Citations
Xuanxuan XIE , Jun’e LI , Fuyang LI , et al . A Backdoor Detection Method for Intelligent Terminal in Modern Power System[J]. Electric Power Construction. 2024, 45(1): 45-55 https://doi.org/10.12204/j.issn.1000-7229.2024.01.005

References

[1]
王增平, 林一峰, 王彤, 等. 电力系统继电保护与安全控制面临的挑战与应对措施[J]. 电力系统保护与控制, 2023, 51(6): 10-20.
WANG Zengping, LIN Yifeng, WANG Tong, et al. Challenges and countermeasures to power system relay protection and safety control[J]. Power System Protection and Control, 2023, 51(6): 10-20.
[2]
龚立, 王先培, 田猛, 等. 电力信息物理系统韧性的概念与提升策略研究进展[J]. 电力系统保护与控制, 2023, 51(14): 169-187.
GONG Li, WANG Xianpei, TIAN Meng, et al. Concepts and research progress on enhancement strategies for cyber physical power system resilience[J]. Power System Protection and Control, 2023, 51(14): 169-187.
[3]
LANGNER R. Stuxnet: dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy, 2011, 9(3): 49-51.
[4]
童晓阳, 王晓茹. 乌克兰停电事件引起的网络攻击与电网信息安全防范思考[J]. 电力系统自动化, 2016, 40(7): 144-148.
TONG Xiaoyang, WANG Xiaoru. Thoughts on network attacks caused by power outage in Ukraine and information security prevention of power grid[J]. Automation of Electric Power Systems, 2016, 40(7): 144-148.
[5]
李中伟, 佟为明, 金显吉. 智能电网信息安全防御体系与信息安全测试系统构建乌克兰和以色列国家电网遭受网络攻击事件的思考与启示[J]. 电力系统自动化, 2016, 40(8): 147-151.
LI Zhongwei, TONG Weiming, JIN Xianji. Construction of information security defense system and information security test system for smart grid thinking and enlightenment of cyber attacks on Ukrainian and Israeli national grids[J]. Automation of Electric Power Systems, 2016, 40(8): 147-151.
[6]
XU X, WANG J J, CHENG S Y, et al. Software backdoor analysis based on sensitive flow tracking and concolic execution[J]. Wuhan University Journal of Natural Sciences, 2016, 21(5): 421-427.
[7]
孙淑华, 马恒太, 张楠, 等. 后门植入、隐藏与检测技术研究[J]. 计算机应用研究, 2004, 21(7): 78-81.
SUN Shuhua, MA Hengtai, ZHANG Nan, et al. Research on planting concealment and detecting technology of backdoors[J]. Application Research of Computers, 2004, 21(7): 78-81.
[8]
袁源, 戴冠中. LKM后门综述[J]. 计算机科学, 2008, 35(7): 5-8.
YUAN Yuan, DAI Guanzhong. Survey on LKM backdoors[J]. Computer Science, 2008, 35(7): 5-8.
[9]
李保杰, 刘岩, 李洪杰, 等. 从乌克兰停电事故看电力信息系统安全问题[J]. 中国电力, 2017, 50(5): 71-77.
LI Baojie, LIU Yan, LI Hongjie, et al. Enlightenment on the security of cyber information system under smart grid from Ukraine blackout[J]. Electric Power, 2017, 50(5): 71-77.
[10]
ASLAN Ö A, SAMET R. A comprehensive review on malware detection approaches[J]. IEEE Access, 2020, 8: 6249-6271.
[11]
陈志锋, 李清宝, 张平, 等. 面向Linux的内核级代码复用攻击检测技术[J]. 软件学报, 2017, 28(7): 1732-1745.
CHEN Zhifeng, LI Qingbao, ZHANG Ping, et al. Kernel code reuse attack detection technique for linux[J]. Journal of Software, 2017, 28(7): 1732-1745.
[12]
陈远鹏, 李永忠. Linux平台下Rootkit木马分析与检测[J]. 电子设计工程, 2017, 25(1): 39-42.
CHEN Yuanpeng, LI Yongzhong. Analysis and detect of Kernel-level Rootkit in Linux platform[J]. Electronic Design Engineering, 2017, 25(1): 39-42.
[13]
高凯轩. 面向Linux系统的Rootkit检测技术研究与实现[D]. 西安: 西安理工大学, 2018.
GAO Kaixuan. Research and implementation of Rootkit detection technology for Linux system[D]. Xi’an: Xi’an University of Technology, 2018.
[14]
AMER E, EL-SAPPAGH S, HU J W. Contextual identification of windows malware through semantic interpretation of API call sequence[J]. Applied Sciences, 2020, 10(21): 7673.
The proper interpretation of the malware API call sequence plays a crucial role in identifying its malicious intent. Moreover, there is a necessity to characterize smart malware mimicry activities that resemble goodware programs. Those types of malware imply further challenges in recognizing their malicious activities. In this paper, we propose a standard and straightforward contextual behavioral models that characterize Windows malware and goodware. We relied on the word embedding to realize the contextual association that may occur between API functions in malware sequences. Our empirical results proved that there is a considerable distinction between malware and goodware call sequences. Based on that distinction, we propose a new method to detect malware that relies on the Markov chain. We also propose a heuristic method that identifies malware’s mimicry activities by tracking the likelihood behavior of a given API call sequence. Experimental results showed that our proposed model outperforms other peer models that rely on API call sequences. Our model returns an average malware detection accuracy of 0.990, with a false positive rate of 0.010. Regarding malware mimicry, our model shows an average noteworthy accuracy of 0.993 in detecting false positives.
[15]
XU Z X, RAY S, SUBRAMANYAN P, et al. Malware detection using machine learning based analysis of virtual memory access patterns[C]// Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017: 169-174.
[16]
文伟平, 陈夏润, 杨法偿. 基于Rootkit隐藏行为特征的Linux恶意代码取证方法[J]. 信息网络安全, 2020, 20(11): 32-42.
WEN Weiping, CHEN Xiarun, YANG Fachang. Malicious code forensics method based on hidden behavior characteristics of Rootkit on Linux[J]. Netinfo Security, 2020, 20(11): 32-42.
[17]
卢臻. Linux内核Rootkit检测技术的研究[D]. 成都: 电子科技大学, 2020.
LU Zhen. Research on Rootkit detection technology of Linux kernel[D]. Chengdu: University of Electronic Science and Technology of China, 2020.
[18]
DAWSON J A, MCDONALD J T, HIVELY L, et al. Phase space detection of virtual machine cyber events through hypervisor-level system call analysis[C]// 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 2018: 159-167.
[19]
刘刚, 徐峥, 崔士伟. KVM环境下内核级Rootkit检测及防护技术研究[J]. 信息安全研究, 2019, 5(7): 616-622.
Abstract
虚拟化技术在云计算环境中已得到广泛应用,其安全性也越来越重要.当前,恶意代码攻击正向复杂性、隐蔽性和持久性等方向发展,已成为我国云基础设施面临的重要威胁之一.特别是在云数据中心大量采用Linux和基于内核的虚拟机(kernelbased virtual machine, KVM)虚拟化背景下,研究KVM虚拟化环境下Linux内核级Rootkit的检测及防护技术具有十分重要的意义.而当前基于虚拟化环境实现Rootkit检测和防护技术研究偏重于检测,在响应和保护阶段还比较缺乏.针对这一问题,提出一种KVM虚拟化环境下集内核级Rootkit安全检测、响应及主动防护的安全架构,并在KVM虚拟化平台中进行了验证.实验结果表明,该安全架构可以有效检测并防止客户虚拟机中内核级Rootkit的攻击.
LIU Gang, XU Zheng, CUI Shiwei. Research on technologies of kernel rootkit detecting and protecting in KVM environment[J]. Journal of Information Security Research, 2019, 5(7): 616-622.
[20]
LI Y G, CHUNG Y C, HWANG K, et al. Virtual wall: filtering rootkit attacks to protect linux kernel functions[J]. IEEE Transactions on Computers, 2021, 70(10): 1640-1653.
[21]
陈鹏. 基于Linux虚拟化的内核级Rootkit的攻击检测研究[D]. 北京: 北京交通大学, 2020.
CHEN Peng. Research on attack detection of kernel-level Rootkit based on Linux virtualization[D]. Beijing: Beijing Jiaotong University, 2020.
[22]
SINGH B, EVTYUSHKIN D, ELWELL J, et al. On the detection of kernel-level rootkits using hardware performance counters[C]// Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. New York: ACM, 2017: 483-493.
[23]
REZENDE E, RUPPERT G, CARVALHO T, et al. Malicious software classification using transfer learning of ResNet-50 deep neural network[C]// 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2018: 1011-1014.
[24]
CUI Z H, DU L, WANG P H, et al. Malicious code detection based on CNNs and multi-objective algorithm[J]. Journal of Parallel and Distributed Computing, 2019, 129: 50-58.
An increasing amount of malicious code causes harm on the internet by threatening user privacy as one of the primary sources of network security vulnerabilities. The detection of malicious code is becoming increasingly crucial, and current methods of detection require much improvement. This paper proposes a method to advance the detection of malicious code using convolutional neural networks (CNNs) and intelligence algorithm. The CNNs are used to identify and classify grayscale images converted from executable files of malicious code. Non-dominated Sorting Genetic Algorithm II (NSGA-II) is then employed to deal with the data imbalance of malware families. A series of experiments are designed for malware image data from Vision Research Lab. The experimental results demonstrate that the proposed method is effective, maintaining higher accuracy and less loss. (C) 2019 Elsevier Inc.
[25]
徐春雨. 面向Rootkit行为的恶意软件检测分析技术研究[D]. 沈阳: 沈阳理工大学, 2019.
XU Chunyu. Research on malware detection and analysis technology oriented to Rootkit behavior[D]. Shenyang: Shenyang Ligong University, 2019.
[26]
HEMALATHA J, ROSELINE S, GEETHA S, et al. An efficient DenseNet-based deep learning model for malware detection[J]. Entropy, 2021, 23(3): 344.
Recently, there has been a huge rise in malware growth, which creates a significant security threat to organizations and individuals. Despite the incessant efforts of cybersecurity research to defend against malware threats, malware developers discover new ways to evade these defense techniques. Traditional static and dynamic analysis methods are ineffective in identifying new malware and pose high overhead in terms of memory and time. Typical machine learning approaches that train a classifier based on handcrafted features are also not sufficiently potent against these evasive techniques and require more efforts due to feature-engineering. Recent malware detectors indicate performance degradation due to class imbalance in malware datasets. To resolve these challenges, this work adopts a visualization-based method, where malware binaries are depicted as two-dimensional images and classified by a deep learning model. We propose an efficient malware detection system based on deep learning. The system uses a reweighted class-balanced loss function in the final classification layer of the DenseNet model to achieve significant performance improvements in classifying malware by handling imbalanced data issues. Comprehensive experiments performed on four benchmark malware datasets show that the proposed approach can detect new malware samples with higher accuracy (98.23% for the Malimg dataset, 98.46% for the BIG 2015 dataset, 98.21% for the MaleVis dataset, and 89.48% for the unseen Malicia dataset) and reduced false-positive rates when compared with conventional malware mitigation techniques while maintaining low computational time. The proposed malware detection solution is also reliable and effective against obfuscation attacks.
[27]
WANG X A, ZHANG J B, ZHANG A, et al. TKRD: trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 2650-2667.
The promotion of cloud computing makes the virtual machine (VM) increasingly a target of malware attacks in cybersecurity such as those by kernel rootkits. Memory forensic, which observes the malicious tracks from the memory aspect, is a useful way for malware detection. In this paper, we propose a novel TKRD method to automatically detect kernel rootkits in VMs from private cloud, by combining VM memory forensic analysis with bio-inspired machine learning technology. Malicious features are extracted from the memory dumps of the VM through memory forensic analysis method. Based on these features, various machine learning classifiers are trained including Decision tree, Rule based classifiers, Bayesian and Support vector machines (SVM). The experiment results show that the Random Forest classifier has the best performance which can effectively detect unknown kernel rootkits with an Accuracy of 0.986 and an AUC value (the area under the receiver operating characteristic curve) of 0.998.
[28]
NADIM M, LEE W, AKOPIAN D. Characteristic features of the kernel-level rootkit for learning-based detection model training[J]. Electronic Imaging, 2021, 33(3): 34-1.
[29]
李彬, 魏吟娬, 祁兵, 等. 基于EEMD-LSTM的需求响应终端DDoS攻击检测方法[J]. 电力建设, 2022, 43(4): 81-90.
Abstract
随着需求响应(demand response,DR)业务及“源-网-荷-储”互动调控的发展,越来越多需求响应终端接入电力网络,需要针对需求响应终端受到分布式拒绝服务(distributed denial of service,DDoS)攻击行为进行预测与防御技术研究。针对当前电力系统网络攻击研究,重点考虑攻击流量自相似特征,提出了一种基于集合经验模态分解(ensemble empirical mode decomposition,EEMD)与长短期记忆(long short-term memory,LSTM)网络相结合的双重检测方法。首先通过集合经验模态分解攻击流量提取模态特征;其次基于改进的LSTM神经网络进行攻击检测;最后进行仿真实验及对比分析,EEMD-LSTM神经网络的检测方法与传统LSTM检测方法相比具有更好的动态性能,有效提高了DDoS攻击检测精度。
LI Bin, WEI Yinwu, QI Bing, et al. DDoS attack detection method based on EEMD-LSTM for demand response terminal[J]. Electric Power Construction, 2022, 43(4): 81-90.

With the development of demand response (DR) business and interactive regulation of “source-network-load-storage”, as more and more demand response terminals access the power network, it is necessary to carry out the prediction and defense technology research on the distributed denial of service (DDoS) behavior of demand response terminals. Aiming at the current network attack research of power system, this paper focuses on the self-similar characteristics of attack traffic, and proposes a network attack model based on ensemble empirical mode decomposition (EEMD) and long short-term memory (LSTM). The detection method firstly extracts the modal features by ensemble empirical mode decomposition attack traffic, then detects the attack applying the improved LSTM neural network, and finally carries out the simulation experiment and comparative analysis. Compared with the traditional LSTM detection method, the EEMD-LSTM neural network detection method has better dynamic performance and effectively improves the DDoS attack detection accuracy.

[30]
夏云舒, 王勇, 周林, 等. 基于改进生成对抗网络的虚假数据注入攻击检测方法[J]. 电力建设, 2022, 43(3): 58-65.
Abstract
随着新型能源互联网的发展,大规模的传感量测系统为基于数据驱动的虚假数据注入攻击检测方法提供了数据支持,然而攻击样本数据不平衡问题会影响此类方法的性能。提出了基于改进生成对抗网络(generative adversarial network, GAN)和极端随机树的数据重平衡攻击检测模型。首先,为了生成高质量数据,设计GAN的结构使其训练稳定;其次,使用Copula函数构建电力系统状态量之间的空间关联性以适应分布式能源的接入;然后,对改进的GAN进行对抗训练得到重平衡的数据集,采用极端随机树分类器实现攻击检测。此外,设计基于多种分类器的数据有效性指标评估生成数据的质量。通过对比实验对所提方法进行验证,结果表明该方法能生成高质量的量测数据,可以有效解决数据不平衡问题,攻击检测率达98.95%。
XIA Yunshu, WANG Yong, ZHOU Lin, et al. False data injection attack detection method based on improved generative adversarial network[J]. Electric Power Construction, 2022, 43(3): 58-65.

With the development of new-type energy internet, large-scale sensing measurement systems provide data support for data-driven detection of false data injection attack. However, the problem of unbalanced attack data will affect the performance of such methods. Therefore, a data rebalance attack detection model based on improved generative adversarial network (GAN) and extremely randomized tree is proposed. Firstly, the GAN structure is designed to make the training procedure stable enough to generate high-quality data. Secondly, the Copula function is used to construct the spatial correlation between the power system states to adapt to the integration of the distributed energy resources. Then, a rebalanced dataset is obtained through the adversarial training of the improved GAN, and the extremely randomized tree classifier is used to detect the attack. In addition, the data validity index based on multiple classifiers is designed to evaluate the quality of the generated data. The effect of the proposed method is verified by comparative experiments. Results show that the method can generate high-quality measurement data, solve the problem of data imbalance, and the attack detection rate is 98.95%.

Funding

National Natural Science Foundation of China(51977155)
Science and Technology Project of State Grid Fujian Electric Power Co., Ltd.(52130420001U)
PDF(2278 KB)

Accesses

Citation

Detail

Sections
Recommended

/