Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection

被引:1
作者
Kim, Tae hoon [1 ]
Krichen, Moez [2 ,3 ]
Alamro, Meznah A. [4 ]
Mihoub, Alaeddine [5 ]
Avelino Sampedro, Gabriel [6 ]
Abbas, Sidra [7 ]
机构
[1] Zhejiang Univ Sci & Technol, Sch Informat & Elect Engn, Hangzhou, Zhejiang, Peoples R China
[2] Al Baha Univ, FCSIT, Al Bahah 65528, Saudi Arabia
[3] Univ Sfax, ReDCAD Lab, Sfax 3038, Tunisia
[4] Princess Nourah Bint Abdul Rahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, Riyadh 11671, Saudi Arabia
[5] Qassim Univ, Coll Business & Econ, Dept Management Informat Syst & Prod Management, POB 6640, Buraydah 51452, Saudi Arabia
[6] De La Salle Coll St Benilde, Sch Management & Informat Technol, Manila 1004, Philippines
[7] COMSATS Univ, Dept Comp Sci, Islamabad, Pakistan
关键词
Adversarial attacks; Malware detection; Smartphone; Deep learning; Machine learning; ATTACKS;
D O I
10.1007/s12083-024-01751-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial malware poses novel threats to smart devices since they grow progressively integrated into daily life, highlighting their potential weaknesses and importance. Several Machine Learning (ML) based methods, such as Intrusion Detection Systems (IDSs), Malware Detection Systems (MDSs), and Device Identification Systems (DISs), have been used in smart device security to detect and prevent cyber-attacks. However, ML still has much malware to overcome, including the proliferation of adversarial malware designed to deceive classifiers. This research generates two novel datasets: first by injecting adversarial attacks in binary malware detection dataset named ADD-1 and second by injecting attacks in malware category detection dataset named ADD-2. Further, it provides an approach to detect adversarial static malware in smartphones utilizing different ML models (Random Forest (RF), Extreme Gradient Boosting (XGB), Decision Tree (DT) and Gradient Boosting (GB), ensemble voting, and Deep Neural Network (DNN) models. This study preprocessed data by analyzing and converting the categorical data into numerical values using the data normalization technique (i.e., standard scalar). According to the findings, the proposed XGB model predicts adversarial attacks with 88% accuracy and outperforms conventional ML and DL models.
引用
收藏
页码:3369 / 3384
页数:16
相关论文
共 41 条
  • [1] Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    Kardan, Navid
    Shah, Mubarak
    [J]. IEEE ACCESS, 2021, 9 : 155161 - 155196
  • [2] Detection of Adversarial Attacks against the Hybrid Convolutional Long Short-Term Memory Deep Learning Technique for Healthcare Monitoring Applications
    Albattah, Albatul
    Rassam, Murad A.
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (11):
  • [3] A Novel Prediction Model for Malicious Users Detection and Spectrum Sensing Based on Stacking and Deep Learning
    Benazzouza, Salma
    Ridouani, Mohammed
    Salahdine, Fatima
    Hayar, Aawatif
    [J]. SENSORS, 2022, 22 (17)
  • [4] Wild patterns: Ten years after the rise of adversarial machine learning
    Biggio, Battista
    Roli, Fabio
    [J]. PATTERN RECOGNITION, 2018, 84 : 317 - 331
  • [5] EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detection
    Bostani, Hamid
    Moonsamy, Veelasha
    [J]. COMPUTERS & SECURITY, 2024, 139
  • [6] Network Intrusion Detection for IoT Security Based on Learning Techniques
    Chaabouni, Nadia
    Mosbah, Mohamed
    Zemmari, Akka
    Sauvignac, Cyrille
    Faruki, Parvez
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03): : 2671 - 2701
  • [7] Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
    Chen, Sen
    Xue, Minhui
    Fan, Lingling
    Hao, Shuang
    Xu, Lihua
    Zhu, Haojin
    Li, Bo
    [J]. COMPUTERS & SECURITY, 2018, 73 : 326 - 344
  • [8] Chen T., 2015, R package version 0.4-2, P1, DOI DOI 10.1145/2939672.2939785
  • [9] A Two-Layer Deep Learning Method for Android Malware Detection Using Network Traffic
    Feng, Jiayin
    Shen, Limin
    Chen, Zhen
    Wang, Yuying
    Li, Hui
    [J]. IEEE ACCESS, 2020, 8 : 125786 - 125796
  • [10] Finlayson SG, 2018, ARXIV