Android malware adversarial attacks based on feature importance prediction

被引:1
|
作者
Guo, Yanping [1 ]
Yan, Qiao [1 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Android malware; Adversarial examples; Generative adversarial network; Feature importance;
D O I
10.1007/s13042-022-01747-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the last decade, malicious Android applications have increased rapidly because of the popularity of Android mobile devices. In particular, some Android malware starts to use the adversarial examples generation technology to escape from the detection system. To defend against the adversarial examples of Android malware, researchers need to research the generation of adversarial examples. Meanwhile, substitute models are one of the research topics in machine learning interpretability. In the paper, we propose a new model called p-MalGAN with a Feature Importance Prediction (FIP) module based on MalGAN, a Generative Adversarial Network (GAN) for generating malware adversarial examples. FIP module uses random forest as an substitute model to calculates the importance of features by measuring the correlation between the features and the labels of the detector to predict the features used by the detector, then uses the high-confidence features to generate adversarial examples. Compared with MalGAN, our model overcomes the difficulty of not knowing detector features in realistic scenes. Experimental results show that our method can effectively predict the features of the detector and reduces the difference between the adversarial examples and the original malware with slightly affecting the attack performance.
引用
收藏
页码:2087 / 2097
页数:11
相关论文
共 50 条
  • [41] Linux Kernel-based Feature Selection for Android Malware Detection
    Kim, Hwan-Hee
    Choi, Mi-Jung
    [J]. 2014 16TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2014,
  • [42] Detecting Android Malware with Intensive Feature Engineering
    Yang, Manzhi
    Wen, QiaoYan
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 157 - 161
  • [43] The Evolution of Permission as Feature for Android Malware Detection
    Gaviria de la Puerta, Jose
    Sanz, Borja
    Santos Grueiro, Igor
    Garcia Bringas, Pablo
    [J]. INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 389 - 400
  • [44] Heterogeneous Feature Space for Android Malware Detection
    Varsha, M. V.
    Vinod, P.
    Dhanya, K. A.
    [J]. 2015 EIGHTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2015, : 383 - 388
  • [45] Detecting Android Malware Based on Dynamic Feature Sequence and Attention Mechanism
    Long, Hanlin
    Tian, Zhicheng
    Liu, Yang
    [J]. 2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 129 - 133
  • [46] Android Malware Detection Based on Stacking and Multi-feature Fusion
    Qin Zhaowei
    Xie Nannan
    Gyamfi, Asiedu Collins
    [J]. ADVANCED DATA MINING AND APPLICATIONS (ADMA 2022), PT I, 2022, 13725 : 199 - 215
  • [47] Android Malware Attacks and Countermeasures: Current and Future Directions
    Raveendranath, Rahul
    Rajamani, Venkiteswaran
    Babu, Anoop Joseph
    Datta, Soumya Kanti
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 137 - 143
  • [48] Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement
    Zhao, Jiapeng
    Liu, Zhongjin
    Zhang, Xiaoling
    Huang, Jintao
    Shi, Zhiqiang
    Lv, Shichao
    Li, Hong
    Sun, Limin
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 603 - 612
  • [49] Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
    Abusnaina, Ahmed
    Khormali, Aminollah
    Alasmary, Hisham
    Park, Jeman
    Anwar, Afsah
    Mohaisen, Aziz
    [J]. 2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1296 - 1305
  • [50] Adversarial Attacks Against Image-Based Malware Detection Using Autoencoders
    Carey, Alycia N.
    Mai, Huy
    Zhan, Justin
    Mehmood, Asif
    [J]. PATTERN RECOGNITION AND TRACKING XXXII, 2021, 11735