DRLDO: A Novel DRL based De-obfuscation System for Defence Against Metamorphic Malware

被引:12
|
作者
Sewak, Mohit [1 ]
Sahay, Sanjay K. [2 ]
Rathore, Hemant [2 ]
机构
[1] Microsoft, Secur & Compliance Res, Hyderabad, India
[2] BITS Pilani, Dept Comp Sci & Informat, Goa Campus, Sancoale 403726, Goa, India
关键词
Adversarial artificial intelligence; Deep reinforcement learning; Metamorphic malware; De-obfuscation;
D O I
10.14429/dsj.71.15780
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we propose a novel mechanism to normalise metamorphic and obfuscated malware down at the opcode level and hence create an advanced metamorphic malware de-obfuscation and defence system. We name this system as DRLDO, for deep reinforcement learning based de-obfuscator. With the inclusion of the DRLDO as a sub-component, an existing intrusion detection system could be augmented with defensive capabilities against 'zero-day' attack from obfuscated and metamorphic variants of existing malware. This gains importance, not only because there exists no system till date that use advance DRL to intelligently and automatically normalise obfuscation down even to the opcode level, but also because the DRLDO system does not mandate any changes to the existing IDS. The DRLDO system does not even mandate the IDS' classifier to be retrained with any new dataset containing obfuscated samples. Hence DRLDO could be easily retrofitted into any existing IDS deployment. We designed, developed, and conducted experiments on the system to evaluate the same against multiple-simultaneous attacks from obfuscations generated from malware samples from a standardised dataset that contain multiple generations of malware. Experimental results prove that DRLDO was able to successfully make the otherwise undetectable obfuscated variants of the malware detectable by an existing pre-trained malware classifier. The detection probability was raised well above the cut-off mark to 0.6 for the classifier to detect the obfuscated malware unambiguously. Further, the de-obfuscated variants generated by DRLDO achieved a very high correlation (of approximate to 0.99) with the base malware. This observation validates that the DRLDO system is actually learning to de-obfuscate and not exploiting a trivial trick.
引用
收藏
页码:55 / 65
页数:11
相关论文
共 50 条
  • [1] PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware
    Ugarte, Denis
    Maiorca, Davide
    Cara, Fabrizio
    Giacinto, Giorgio
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), 2019, 11543 : 240 - 259
  • [2] Building the De-obfuscation Platform Based on LLVM
    Kim, Jihun
    Ko, Kwangman
    Youn, Jonghee M.
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 1269 - 1274
  • [3] Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
    Yosuke Isobe
    Haruaki Tamada
    [J]. International Journal of Networked and Distributed Computing, 2018, 6 (4) : 232 - 238
  • [4] Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
    Isobe, Yosuke
    Tamada, Haruaki
    [J]. INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2018, 6 (04) : 232 - 238
  • [5] JS']JSDES - An Automated De-Obfuscation System for Malicious Java']JavaScript
    AbdelKhalek, Moataz
    Shosha, Ahmed
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [6] Estimating the Circuit De-obfuscation Runtime based on Graph Deep Learning
    Chen, Zhiqian
    Kolhe, Gaurav
    Rafatirad, Setareh
    Lu, Chang-Tien
    Manoj, Sai P. D.
    Homayoun, Houman
    Zhao, Liang
    [J]. PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 358 - 363
  • [7] Semantics-based binary code automated de-obfuscation approach
    Guo J.
    Wang L.
    Tang Z.
    Fang D.
    [J]. 2016, Huazhong University of Science and Technology (44): : 55 - 59
  • [8] SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation
    Tang, Zhanyong
    Kuang, Kaiyuan
    Wang, Lei
    Xue, Chao
    Gong, Xiaoqing
    Chen, Xiaojiang
    Fang, Dingyi
    Liu, Jie
    Wang, Zheng
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 261 - 268
  • [9] ADVERSARIALuscator: An Adversarial-DRL based Obfuscator and Metamorphic Malware Swarm Generator
    Sewak, Mohit
    Sahay, Sanjay K.
    Rathore, Hemant
    [J]. 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [10] Permutation Network De-obfuscation: A Delay-based Attack and Countermeasure Investigation
    Guo, Zimu
    Chowdhury, Sreeja
    Tehranipoor, Mark M.
    Forte, Domenic
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2020, 16 (02)