Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features

被引:0
|
作者
Hariom [1 ]
Handa, Anand [1 ]
Kumar, Nitesh [1 ]
Shukla, Sandeep Kumar [1 ]
机构
[1] Indian Inst Technol Kanpur, Dept CSE, C3i Ctr, Kanpur, Uttar Pradesh, India
关键词
Adversarial machine learning; Evasion attacks; API call sequence; Dynamic analysis;
D O I
10.1007/978-3-030-78086-9_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware designers have become increasingly sophisticated over time, crafting polymorphic and metamorphic malware employing obfuscation tricks such as packing and encryption to evade signature-based malware detection systems. Therefore, security professionals use machine learning-based systems to toughen their defenses - based on malware's dynamic behavioral features. However, these systems are susceptible to adversarial inputs. Some malware designers exploit this vulnerability to bypass detection. In this work, we develop two approaches to evade machine learning-based classifiers. First, we create a Generative Adversarial Networks (GAN) based method, which we call 'Malware Evasion using GAN' (MEGAN) and the extended version 'Malware Evasion using GAN with Reduced Perturbation (MEGAN-RP).' Second, we develop a novel reinforcement learning-based approach called 'Malware Evasion using Reinforcement Agent (MERA).' We generate adversarial malware that simultaneously minimizes the recall of a target classifier and the amount of perturbation needed in the actual malware to evade detection. We evaluate our work against 13 different BlackBox detection models - all of which use dynamic presence-absence of API calls as features. We observe that our approaches reduce the recall of almost all BlackBox models to zero. Further, MERA outperforms all the other models and reduces True Positive Rate (TPR) to zero against all target models except the Decision Tree (DT) - with minimum perturbation in 6 out of 13 target models. We also present experimental results on adversarial retraining defense and its evasion for GAN based strategies.
引用
收藏
页码:20 / 37
页数:18
相关论文
共 10 条
  • [1] Multiclass Malware Classification Using Either Static Opcodes or Dynamic API Calls
    Chanajitt, Rajchada
    Pfahringer, Bernhard
    Gomes, Heitor Murilo
    Yogarajan, Vithya
    [J]. AI 2022: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, 13728 : 427 - 441
  • [2] Assessment of supervised machine learning algorithms using dynamic API calls for malware detection
    Singh, Jagsir
    Singh, Jaswinder
    [J]. International Journal of Computers and Applications, 2022, 44 (03) : 270 - 277
  • [3] Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
    Marshev, I. I.
    Zhukovskii, E., V
    Aleksandrova, E. B.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1025 - 1028
  • [4] Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
    I. I. Marshev
    E. V. Zhukovskii
    E. B. Aleksandrova
    [J]. Automatic Control and Computer Sciences, 2021, 55 : 1025 - 1028
  • [5] Adversarial Attacks Against Image-Based Malware Detection Using Autoencoders
    Carey, Alycia N.
    Mai, Huy
    Zhan, Justin
    Mehmood, Asif
    [J]. PATTERN RECOGNITION AND TRACKING XXXII, 2021, 11735
  • [6] Dynamic trigger-based attacks against next-generation IoT malware family classifiers
    Zhang, Yefei
    Torabi, Sadegh
    Yan, Jun
    Assi, Chadi
    [J]. Computers and Security, 2025, 149
  • [7] Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning
    Hemant Rathore
    Sanjay K. Sahay
    Piyush Nikam
    Mohit Sewak
    [J]. Information Systems Frontiers, 2021, 23 : 867 - 882
  • [8] Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning
    Rathore, Hemant
    Sahay, Sanjay K.
    Nikam, Piyush
    Sewak, Mohit
    [J]. INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) : 867 - 882
  • [9] Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features
    Tong, Liang
    Li, Bo
    Hajaj, Chen
    Xiao, Chaowei
    Zhang, Ning
    Vorobeychik, Yevgeniy
    [J]. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 285 - 302
  • [10] Defending against Null Calls Stream Attacks by using a double-threshold dynamic filter
    Xu, HZ
    Cui, CW
    Lin, Y
    Luo, TJ
    Dong, ZQ
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 261 - 270