PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks

被引:0
|
作者
Li, Deqiang [1 ]
Cui, Shicheng [2 ]
Li, Yun [1 ]
Xu, Jia [1 ]
Xiao, Fu [1 ]
Xu, Shouhuai [3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
[2] Nanjing Inst Technol, Sch Comp Engn, Nanjing 211167, Peoples R China
[3] Univ Colorado Colorado Springs, Dept Comp Sci, Colorado Springs, CO 80918 USA
关键词
Adversarial example; deep neural network; evasion attack; malware detection; provable defense; DEFENSES;
D O I
10.1109/TDSC.2023.3265665
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) techniques can facilitate the automation of malicious software (malware for short) detection, but suffer from evasion attacks. Many studies counter such attacks in heuristic manners, lacking theoretical guarantees and defense effectiveness. In this article, we propose a new adversarial training framework, termed Principled Adversarial Malware Detection (PAD), which offers convergence guarantees for robust optimization methods. PAD lays on a learnable convex measurement that quantifies distribution-wise discrete perturbations to protect malware detectors from adversaries, whereby for smooth detectors, adversarial training can be performed with theoretical treatments. To promote defense effectiveness, we propose a new mixture of attacks to instantiate PAD to enhance deep neural network-based measurements and malware detectors. Experimental results on two Android malware datasets demonstrate: (i) the proposed method significantly outperforms the state-of-the-art defenses; (ii) it can harden ML-based malware detection against 27 evasion attacks with detection accuracies greater than 83.45%, at the price of suffering an accuracy decrease smaller than 2.16% in the absence of attacks; (iii) it matches or outperforms many anti-malware scanners in VirusTotal against realistic adversarial malware.
引用
收藏
页码:920 / 936
页数:17
相关论文
共 50 条
  • [1] Defending malware detection models against evasion based adversarial attacks
    Rathore, Hemant
    Sasan, Animesh
    Sahay, Sanjay K.
    Sewak, Mohit
    [J]. PATTERN RECOGNITION LETTERS, 2022, 164 : 119 - 125
  • [2] Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
    Li, Deqiang
    Li, Qianmu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3886 - 3900
  • [3] An Adversarial Machine Learning Model Against Android Malware Evasion Attacks
    Chen, Lingwei
    Hou, Shifu
    Ye, Yanfang
    Chen, Lifei
    [J]. WEB AND BIG DATA, 2017, 10612 : 43 - 55
  • [4] Are Malware Detection Models Adversarial Robust Against Evasion Attack?
    Rathore, Hemant
    Samavedhi, Adithya
    Sahay, Sanjay K.
    Sewak, Mohit
    [J]. IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [5] Robust Android Malware Detection against Adversarial Example Attacks
    Li, Heng
    Zhou, Shiyao
    Yuan, Wei
    Luo, Xiapu
    Gao, Cuiying
    Chen, Shuiyan
    [J]. PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 3603 - 3612
  • [6] Adversarial mRMR against Evasion Attacks
    Wu, Miaomiao
    Li, Yun
    [J]. 2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018,
  • [7] Adversarial Attacks on Mobile Malware Detection
    Shahpasand, Maryam
    Hamey, Len
    Vatsalan, Dinusha
    Xue, Minhui
    [J]. 2019 IEEE 1ST INTERNATIONAL WORKSHOP ON ARTIFICIAL INTELLIGENCE FOR MOBILE (AI4MOBILE '19), 2019, : 17 - 20
  • [8] Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API
    Kannan, Raadhesh
    Jian, Chin Ji
    Guo, XiaoNing
    [J]. INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020), 2020, : 172 - 175
  • [9] Defending network intrusion detection systems against adversarial evasion attacks
    Pawlicki, Marek
    Choras, Michal
    Kozik, Rafal
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 148 - 154
  • [10] Towards Adversarial Learning: From Evasion Attacks to Poisoning Attacks
    Wang, Wentao
    Xu, Han
    Wan, Yuxuan
    Ren, Jie
    Tang, Jiliang
    [J]. PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, : 4830 - 4831