A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security

被引:25
|
作者
Yan, Senming [1 ,2 ]
Ren, Jing [3 ,4 ]
Wang, Wei [5 ]
Sun, Limin [1 ,2 ]
Zhang, Wei [6 ]
Yu, Quan [5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100000, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100000, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu 610056, Peoples R China
[4] Peng Cheng Lab, Dept Math & Theories, Shenzhen 518066, Peoples R China
[5] Peng Cheng Lab, Dept Math & Sci, Shenzhen 518066, Peoples R China
[6] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
来源
基金
中国国家自然科学基金;
关键词
Cyber security; malware; malware classification; adversarial examples; adversarial robustness; FRAMEWORK; NETWORKS; SYSTEMS; THREAT;
D O I
10.1109/COMST.2022.3225137
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware poses a severe threat to cyber security. Attackers use malware to achieve their malicious purposes, such as unauthorized access, stealing confidential data, blackmailing, etc. Machine learning-based defense methods are applied to classify malware examples. However, such methods are vulnerable to adversarial attacks, where attackers aim to generate adversarial examples that can evade detection. Defenders also develop various approaches to enhance the robustness of malware classifiers against adversarial attacks. Both attackers and defenders evolve in the continuous confrontation of malware classification. In this paper, we firstly summarize a unified malware classification framework. Then, based on the framework, we systematically survey the Defense-Attack-Enhanced-Defense process and provide a comprehensive review of (i) machine learning-based malware classification, (ii) adversarial attacks on malware classifiers, and (iii) robust malware classification. Finally, we highlight the main challenges faced by both attackers and defenders and discuss some promising future work directions.
引用
收藏
页码:467 / 496
页数:30
相关论文
共 50 条
  • [21] A survey on coordinated attacks against cyber-physical power systems: Attack, detection, and defense methods
    Feng, Yuxin
    Huang, Rong
    Zhao, Weijia
    Yin, Peidong
    Li, Yuancheng
    ELECTRIC POWER SYSTEMS RESEARCH, 2025, 241
  • [22] A Survey of Game Theoretic Methods for Cyber Security
    Wang, Yuan
    Wang, Yongjun
    Liu, Jing
    Huang, Zhijian
    Xie, Peidai
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 631 - 636
  • [23] A Survey of Deep Learning Methods for Cyber Security
    Berman, Daniel S.
    Buczak, Anna L.
    Chavis, Jeffrey S.
    Corbett, Cherita L.
    INFORMATION, 2019, 10 (04)
  • [24] A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention
    Ibor, Ayei E.
    Oladeji, Florence A.
    Okunoye, Olusoji B.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (04): : 15 - 28
  • [25] A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat
    Zhu B.
    Guo Y.
    Guo C.
    Jiang Z.
    Zhang X.
    Yuan X.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2021, 49 (01): : 178 - 187
  • [26] Sinkhorn Adversarial Attack and Defense
    Subramanyam, A. V.
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 31 : 4039 - 4049
  • [27] Adversarial Deep Learning: A Survey on Adversarial Attacks and Defense Mechanisms on Image Classification
    Khamaiseh, Samer Y.
    Bagagem, Derek
    Al-Alaj, Abdullah
    Mancino, Mathew
    Alomari, Hakam W.
    IEEE ACCESS, 2022, 10 : 102266 - 102291
  • [28] Survey of Adversarial Attack, Defense and Robustness Analysis for Natural Language Processing
    Zheng H.
    Chen J.
    Zhang Y.
    Zhang X.
    Ge C.
    Liu Z.
    Ouyang Y.
    Ji S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1727 - 1750
  • [29] Research survey on defense strategy of attack threat in cyber physical systems
    Wen, Cheng-Lin
    Yang, Li
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2024, 41 (12): : 2224 - 2236
  • [30] Hybrid adversarial defense: Merging honeypots and traditional security methods
    Chakraborty, Tanmoy
    Jajodia, Sushil
    Park, Noseong
    Pugliese, Andrea
    Serra, Edoardo
    Subrahmanian, V. S.
    JOURNAL OF COMPUTER SECURITY, 2018, 26 (05) : 615 - 645