A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security

被引:19
|
作者
Yan, Senming [1 ,2 ]
Ren, Jing [3 ,4 ]
Wang, Wei [5 ]
Sun, Limin [1 ,2 ]
Zhang, Wei [6 ]
Yu, Quan [5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100000, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100000, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu 610056, Peoples R China
[4] Peng Cheng Lab, Dept Math & Theories, Shenzhen 518066, Peoples R China
[5] Peng Cheng Lab, Dept Math & Sci, Shenzhen 518066, Peoples R China
[6] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
来源
基金
中国国家自然科学基金;
关键词
Cyber security; malware; malware classification; adversarial examples; adversarial robustness; FRAMEWORK; NETWORKS; SYSTEMS; THREAT;
D O I
10.1109/COMST.2022.3225137
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware poses a severe threat to cyber security. Attackers use malware to achieve their malicious purposes, such as unauthorized access, stealing confidential data, blackmailing, etc. Machine learning-based defense methods are applied to classify malware examples. However, such methods are vulnerable to adversarial attacks, where attackers aim to generate adversarial examples that can evade detection. Defenders also develop various approaches to enhance the robustness of malware classifiers against adversarial attacks. Both attackers and defenders evolve in the continuous confrontation of malware classification. In this paper, we firstly summarize a unified malware classification framework. Then, based on the framework, we systematically survey the Defense-Attack-Enhanced-Defense process and provide a comprehensive review of (i) machine learning-based malware classification, (ii) adversarial attacks on malware classifiers, and (iii) robust malware classification. Finally, we highlight the main challenges faced by both attackers and defenders and discuss some promising future work directions.
引用
收藏
页码:467 / 496
页数:30
相关论文
共 50 条
  • [1] A Review of Adversarial Attack and Defense for Classification Methods
    Li, Yao
    Cheng, Minhao
    Hsieh, Cho-Jui
    Lee, Thomas C. M.
    [J]. AMERICAN STATISTICIAN, 2022, 76 (04): : 329 - 345
  • [2] Adversarial Attack and Defense: A Survey
    Liang, Hongshuo
    He, Erlu
    Zhao, Yangyang
    Jia, Zhe
    Li, Hao
    [J]. ELECTRONICS, 2022, 11 (08)
  • [3] Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
    Rosenberg, Ishai
    Shabtai, Asaf
    Elovici, Yuval
    Rokach, Lior
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (05)
  • [4] Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges
    Dong, Junhao
    Chen, Junxi
    Xie, Xiaohua
    Lai, Jianhuang
    Chen, Hao
    [J]. ACM Computing Surveys, 2024, 57 (03)
  • [5] Adversarial Attack and Defense on Graph Data: A Survey
    Sun, Lichao
    Dou, Yingtong
    Yang, Carl
    Zhang, Kai
    Wang, Ji
    Yu, Philip S.
    He, Lifang
    Li, Bo
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (08) : 7693 - 7711
  • [6] A Robust CNN for Malware Classification against Executable Adversarial Attack
    Zhang, Yunchun
    Jiang, Jiaqi
    Yi, Chao
    Li, Hai
    Min, Shaohui
    Zuo, Ruifeng
    An, Zhenzhou
    Yu, Yongtao
    [J]. ELECTRONICS, 2024, 13 (05)
  • [7] Generative Adversarial Networks: A Survey on Attack and Defense Perspective
    Zhang, Chenhan
    Yu, Shui
    Tian, Zhiyi
    Yu, James J. Q.
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [8] Malware Evasion Attack and Defense
    Huang, Yonghong
    Verma, Utkarsh
    Fralick, Celeste
    Infante-Lopez, Gabriel
    Kumar, Brajesh
    Woodward, Carl
    [J]. 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2019, : 34 - 38
  • [9] A survey on coordinated attacks against cyber–physical power systems: Attack, detection, and defense methods
    Feng, Yuxin
    Huang, Rong
    Zhao, Weijia
    Yin, Peidong
    Li, Yuancheng
    [J]. Electric Power Systems Research, 2025, 241
  • [10] Survey of Attack Projection, Prediction, and Forecasting in Cyber Security
    Husak, Martin
    Komarkova, Jana
    Bou-Harb, Elias
    Celeda, Pavel
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 640 - 660