Detecting Poisoning Attacks on Hierarchical Malware Classification Systems

被引:2
|
作者
Guralnik, Dan P. [1 ]
Moran, Bill [2 ]
Pezeshki, Ali [3 ]
Arslan, Omur [1 ]
机构
[1] Univ Penn, Kodlab, Elect & Syst Engn, 200 South 33rd St,Moore Bldg 203, Philadelphia, PA 19104 USA
[2] RMIT Univ, Elect & Comp Engn, 376 Swanston St, Melbourne, Vic 3000, Australia
[3] Colorado State Univ, Elect & Comp Engn, 1373 Campus Delivery, Ft Collins, CO 80523 USA
来源
CYBER SENSING 2017 | 2017年 / 10185卷
基金
美国国家科学基金会;
关键词
poisoning attack; hierarchical clustering; hierarchical entropy measure; SOCIAL NETWORK ANALYSIS;
D O I
10.1117/12.2266556
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Anti-virus software based on unsupervised hierarchical clustering (HC) of malware samples has been shown to be vulnerable to poisoning attacks. In this kind of attack, a malicious player degrades anti-virus performance by submitting to the database samples specifically designed to collapse the classification hierarchy utilized by the anti-virus (and constructed through HC) or otherwise deform it in a way that would render it useless. Though each poisoning attack needs to be tailored to the particular HC scheme deployed, existing research seems to indicate that no particular HC method by itself is immune. We present results on applying a new notion of entropy for combinatorial dendrograms to the problem of controlling the influx of samples into the data base and deflecting poisoning attacks. In a nutshell, effective and tractable measures of change in hierarchy complexity are derived from the above, enabling on-the-fly flagging and rejection of potentially damaging samples. The information-theoretic underpinnings of these measures ensure their indifference to which particular poisoning algorithm is being used by the attacker, rendering them particularly attractive in this setting.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
    Chen, Sen
    Xue, Minhui
    Fan, Lingling
    Hao, Shuang
    Xu, Lihua
    Zhu, Haojin
    Li, Bo
    COMPUTERS & SECURITY, 2018, 73 : 326 - 344
  • [2] Stronger Targeted Poisoning Attacks Against Malware Detection
    Narisada, Shintaro
    Sasaki, Shoichiro
    Hidano, Seira
    Uchibayashi, Toshihiro
    Suganuma, Takuo
    Hiji, Masahiro
    Kiyomoto, Shinsaku
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 65 - 84
  • [3] Hierarchical Classification of Android Malware Traffic
    Bovenzi, Giampaolo
    Persico, Valerio
    Pescape, Antonio
    Piscitelli, Anna
    Spadari, Vincenzo
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1354 - 1359
  • [4] Hierarchical Learning for Automated Malware Classification
    Chakraborty, Shayok
    Stokes, Jack W.
    Xiao, Lin
    Zhou, Dengyong
    Marinescu, Mady
    Thomas, Anil
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 23 - 28
  • [5] Malware Attacks on Smartphones and Their Classification Based Detection
    Gupta, Anand
    Dutta, Spandan
    Mangla, Vivek
    CONTEMPORARY COMPUTING, 2011, 168 : 242 - 253
  • [6] ON DRIVE-BY-DOWNLOAD ATTACKS AND MALWARE CLASSIFICATION
    Puttaroo, Mohammad
    Komisarczuk, Peter
    de Amorim, Renato Cordeiro
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 13), 2013, : 217 - 225
  • [7] A Sampling-Based Method for Detecting Data Poisoning Attacks in Recommendation Systems
    Li, Mohan
    Lian, Yuxin
    Zhu, Jinpeng
    Lin, Jingyi
    Wan, Jiawen
    Sun, Yanbin
    MATHEMATICS, 2024, 12 (02)
  • [8] Detecting Malware with Classification Machine Learning Techniques
    Yusof, Mohd Azahari Mohd
    Abdullah, Zubaile
    Ali, Firkhan Ali Hamid
    Sukri, Khairul Amin Mohamad
    Hussain, Hanizan Shaker
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 167 - 172
  • [9] A Hierarchical Convolutional Neural Network for Malware Classification
    Gibert, Daniel
    Mateu, Carles
    Planes, Jordi
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [10] Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
    Severi, Giorgio
    Meyer, Jim
    Coull, Scott
    Oprea, Alina
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1487 - 1504