Malware Evasion Attack and Defense

被引:11
|
作者
Huang, Yonghong [1 ]
Verma, Utkarsh [1 ]
Fralick, Celeste [1 ]
Infante-Lopez, Gabriel [2 ]
Kumar, Brajesh [3 ]
Woodward, Carl [1 ]
机构
[1] McAfee, Plano, TX 75024 USA
[2] McAfee, Cordoba, Argentina
[3] McAfee, Hyderabad, Telangana, India
关键词
Adversarial machine learning; adversarial examples; evasion attack; defense;
D O I
10.1109/DSN-W.2019.00014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine learning (ML) classifiers are vulnerable to adversarial examples. An adversarial example is an input sample which is slightly modified to induce misclassification in an ML classifier. In this work, we investigate white-box and grey-box evasion attacks to an ML-based malware detector and conduct performance evaluations in a real-world setting. We compare the defense approaches in mitigating the attacks. We propose a framework for deploying grey-box and black-box attacks to malware detection systems.
引用
收藏
页码:34 / 38
页数:5
相关论文
共 50 条
  • [1] Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
    Chen, Lingwei
    Ye, Yanfang
    Bourlai, Thirimachos
    [J]. 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 99 - 106
  • [2] Are Malware Detection Models Adversarial Robust Against Evasion Attack?
    Rathore, Hemant
    Samavedhi, Adithya
    Sahay, Sanjay K.
    Sewak, Mohit
    [J]. IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [3] Online Malware Defense using Attack Behavior Model
    Das, Sanjeev
    Xiao, Hao
    Liu, Yang
    Zhang, Wei
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1322 - 1325
  • [4] Zero-Day Evasion Attack Analysis on Race between Attack and Defense
    Kwon, Hyun
    Yoon, Hyunsoo
    Choi, Daeseon
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 805 - 807
  • [5] PARASITE DEFENSE-MECHANISMS FOR EVASION OF HOST ATTACK - A REVIEW
    LEID, RW
    SUQUET, CM
    TANIGOSHI, L
    [J]. VETERINARY PARASITOLOGY, 1987, 25 (02) : 147 - 162
  • [6] A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security
    Yan, Senming
    Ren, Jing
    Wang, Wei
    Sun, Limin
    Zhang, Wei
    Yu, Quan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 467 - 496
  • [7] A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
    Ferdous, Jannatul
    Islam, Rafiqul
    Mahboubi, Arash
    Islam, Md. Zahidul
    [J]. IEEE ACCESS, 2023, 11 : 121118 - 121141
  • [8] Research on Deep Learning-Powered Malware Attack and Defense Techniques
    Ji T.-T.
    Fang B.-X.
    Cui X.
    Wang Z.-R.
    Gan R.-L.
    Han Y.
    Yu W.-Q.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (04): : 669 - 695
  • [9] A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack ☆
    Geng, Jiaxuan
    Wang, Junfeng
    Fang, Zhiyang
    Zhou, Yingjie
    Wu, Di
    Ge, Wenhan
    [J]. COMPUTERS & SECURITY, 2024, 137
  • [10] EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detection
    Bostani, Hamid
    Moonsamy, Veelasha
    [J]. COMPUTERS & SECURITY, 2024, 139