A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security

被引:19
|
作者
Yan, Senming [1 ,2 ]
Ren, Jing [3 ,4 ]
Wang, Wei [5 ]
Sun, Limin [1 ,2 ]
Zhang, Wei [6 ]
Yu, Quan [5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100000, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100000, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu 610056, Peoples R China
[4] Peng Cheng Lab, Dept Math & Theories, Shenzhen 518066, Peoples R China
[5] Peng Cheng Lab, Dept Math & Sci, Shenzhen 518066, Peoples R China
[6] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
来源
基金
中国国家自然科学基金;
关键词
Cyber security; malware; malware classification; adversarial examples; adversarial robustness; FRAMEWORK; NETWORKS; SYSTEMS; THREAT;
D O I
10.1109/COMST.2022.3225137
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware poses a severe threat to cyber security. Attackers use malware to achieve their malicious purposes, such as unauthorized access, stealing confidential data, blackmailing, etc. Machine learning-based defense methods are applied to classify malware examples. However, such methods are vulnerable to adversarial attacks, where attackers aim to generate adversarial examples that can evade detection. Defenders also develop various approaches to enhance the robustness of malware classifiers against adversarial attacks. Both attackers and defenders evolve in the continuous confrontation of malware classification. In this paper, we firstly summarize a unified malware classification framework. Then, based on the framework, we systematically survey the Defense-Attack-Enhanced-Defense process and provide a comprehensive review of (i) machine learning-based malware classification, (ii) adversarial attacks on malware classifiers, and (iii) robust malware classification. Finally, we highlight the main challenges faced by both attackers and defenders and discuss some promising future work directions.
引用
收藏
页码:467 / 496
页数:30
相关论文
共 50 条
  • [41] Adversarial Attack and Defense in Deep Ranking
    Zhou, Mo
    Wang, Le
    Niu, Zhenxing
    Zhang, Qilin
    Zheng, Nanning
    Hua, Gang
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (08) : 5306 - 5324
  • [42] Cyber Attack and Defense Emulation Agents
    Yoo, Jeong Do
    Park, Eunji
    Lee, Gyungmin
    Ahn, Myung Kil
    Kim, Donghwa
    Seo, Seongyun
    Kim, Huy Kang
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (06):
  • [43] COMBATING FALSE SENSE OF SECURITY: BREAKING THE DEFENSE OF ADVERSARIAL TRAINING VIA NON-GRADIENT ADVERSARIAL ATTACK
    Fan, Mingyuan
    Liu, Yang
    Chen, Cen
    Yu, Shengxing
    Guo, Wenzhong
    Liu, Ximeng
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 3293 - 3297
  • [44] Adversarial Attack on Microarchitectural Events based Malware Detectors
    Dinakarrao, Sai Manoj Pudukotai
    Amberkar, Sairaj
    Bhat, Sahil
    Dhavlle, Abhijitt
    Sayadi, Hossein
    Sasan, Avesta
    Homayoun, Houman
    Rafatirad, Setareh
    [J]. PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [45] A Survey of Malware Classification Methods Based on Data Flow Graph
    Jiang, Tingting
    Cui, Lingling
    Lin, Zedong
    Lu, Faming
    [J]. DATA SCIENCE (ICPCSEE 2022), PT I, 2022, 1628 : 80 - 93
  • [46] Serious games as a tool to model attack and defense scenarios for cyber-security exercises
    Yamin, Muhammad Mudassar
    Katt, Basel
    Nowostawski, Mariusz
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [47] A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation
    Regainia, Loukmen
    Salva, Sebastien
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 136 - 146
  • [48] ELAMD: An ensemble learning framework for adversarial malware defense
    Chen, Jiaqi
    Yuan, Chong
    Li, Jiashuo
    Tian, Donghai
    Ma, Rui
    Jia, Xiaoqi
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [49] Adversarial Attack on Sentiment Classification
    Tsai, Alicia Yi-Ting
    Yang, Tobey
    Chen, Erica
    [J]. BLACKBOXNLP WORKSHOP ON ANALYZING AND INTERPRETING NEURAL NETWORKS FOR NLP AT ACL 2019, 2019, : 233 - 240
  • [50] A Review on Cybersecurity Analysis, Attack Detection, and Attack Defense Methods in Cyber-physical Power Systems
    Du, Dajun
    Zhu, Minggao
    Li, Xue
    Fei, Minrui
    Bu, Siqi
    Wu, Lei
    Li, Kang
    [J]. JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2023, 11 (03) : 727 - 743