Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses

被引:13
|
作者
Rathore, Hemant [1 ]
Samavedhi, Adithya [1 ]
Sahay, Sanjay K. [1 ]
Sewak, Mohit [2 ]
机构
[1] BITS Pilani, Dept CS&IS, Goa Campus, Pilani, Rajasthan, India
[2] Microsoft, Secur & Compliance Res, Bengaluru, India
关键词
Android; Adversarial learning; Deep neural network; Machine learning; Malware detection;
D O I
10.1016/j.fsidi.2021.301183
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The last decade witnessed an exponential growth of smartphones and their users, which has drawn massive attention from malware designers. The current malware detection engines are unable to cope with the volume, velocity, and variety of incoming malware. Thus the anti-malware community is investigating the use of machine learning and deep learning to develop malware detection models. However, research in other domains suggests that the machine learning/deep learning models are vulnerable to adversarial attacks. Therefore in this work, we proposed a framework to construct robust malware detection models against adversarial attacks. We first constructed twelve different malware detection models using a variety of classification algorithms. Then we acted as an adversary and proposed Gradient-based Adversarial Attack Network to perform adversarial attacks on the above detection models. The attack is designed to convert the maximum number of malware samples into adversarial samples with minimal modifications in each sample. The proposed attack achieves an average fooling rate of 98.68% against twelve permission-based malware detection models and 90.71% against twelve intent-based malware detection models. We also identified the list of vulnerable permissions/intents which an adversary can use to force misclassifications in detection models. Later we proposed three adversarial defense strategies to counter the attacks performed on detection models. The proposed Hybrid Distillation based defense strategy improved the average accuracy by 54.21% for twelve permission-based detection models and 59.14% for intent-based detection models. We also concluded that the adversarial-based study improves the performance and robustness of malware detection models and is essential before any real-world deployment. (C) 2021 The Authors. Published by Elsevier Ltd.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
    Kolosnjaji, Bojan
    Demontis, Ambra
    Biggio, Battista
    Maiorca, Davide
    Giacinto, Giorgio
    Eckert, Claudia
    Roli, Fabio
    [J]. 2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 533 - 537
  • [42] Evaluating the Effectiveness of Attacks and Defenses on Machine Learning Through Adversarial Samples
    Gala, Viraj R.
    Schneider, Martin A.
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS, ICSTW, 2023, : 90 - 97
  • [43] A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning
    Sadeghi, Koosha
    Banerjee, Ayan
    Gupta, Sandeep K. S.
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (04): : 450 - 467
  • [44] DeepRobust: a Platform for Adversarial Attacks and Defenses
    Li, Yaxin
    Jin, Wei
    Xu, Han
    Tang, Jiliang
    [J]. THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 16078 - 16080
  • [45] On Adaptive Attacks to Adversarial Example Defenses
    Tramer, Florian
    Carlini, Nicholas
    Brendel, Wieland
    Madry, Aleksander
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 33, NEURIPS 2020, 2020, 33
  • [46] An Adversarial Machine Learning Model Against Android Malware Evasion Attacks
    Chen, Lingwei
    Hou, Shifu
    Ye, Yanfang
    Chen, Lifei
    [J]. WEB AND BIG DATA, 2017, 10612 : 43 - 55
  • [47] Deep learning adversarial attacks and defenses on license plate recognition system
    Vizcarra, Conrado
    Alhamed, Shadan
    Algosaibi, Abdulelah
    Alnaeem, Mohammed
    Aldalbahi, Adel
    Aljaafari, Nura
    Sawalmeh, Ahmad
    Nazzal, Mahmoud
    Khreishah, Abdallah
    Alhumam, Abdulaziz
    Anan, Muhammad
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 11627 - 11644
  • [48] How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
    Costa, Joana C.
    Roxo, Tiago
    Proenca, Hugo
    Inacio, Pedro Ricardo Morais
    [J]. IEEE ACCESS, 2024, 12 : 61113 - 61136
  • [49] Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
    Demetrio, Luca
    Biggio, Battista
    Roli, Fabio
    [J]. IEEE SECURITY & PRIVACY, 2022, 20 (05) : 77 - 85
  • [50] PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
    Li, Deqiang
    Cui, Shicheng
    Li, Yun
    Xu, Jia
    Xiao, Fu
    Xu, Shouhuai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 920 - 936