Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection

被引:1
作者
Kim, Tae hoon [1 ]
Krichen, Moez [2 ,3 ]
Alamro, Meznah A. [4 ]
Mihoub, Alaeddine [5 ]
Avelino Sampedro, Gabriel [6 ]
Abbas, Sidra [7 ]
机构
[1] Zhejiang Univ Sci & Technol, Sch Informat & Elect Engn, Hangzhou, Zhejiang, Peoples R China
[2] Al Baha Univ, FCSIT, Al Bahah 65528, Saudi Arabia
[3] Univ Sfax, ReDCAD Lab, Sfax 3038, Tunisia
[4] Princess Nourah Bint Abdul Rahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, Riyadh 11671, Saudi Arabia
[5] Qassim Univ, Coll Business & Econ, Dept Management Informat Syst & Prod Management, POB 6640, Buraydah 51452, Saudi Arabia
[6] De La Salle Coll St Benilde, Sch Management & Informat Technol, Manila 1004, Philippines
[7] COMSATS Univ, Dept Comp Sci, Islamabad, Pakistan
关键词
Adversarial attacks; Malware detection; Smartphone; Deep learning; Machine learning; ATTACKS;
D O I
10.1007/s12083-024-01751-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial malware poses novel threats to smart devices since they grow progressively integrated into daily life, highlighting their potential weaknesses and importance. Several Machine Learning (ML) based methods, such as Intrusion Detection Systems (IDSs), Malware Detection Systems (MDSs), and Device Identification Systems (DISs), have been used in smart device security to detect and prevent cyber-attacks. However, ML still has much malware to overcome, including the proliferation of adversarial malware designed to deceive classifiers. This research generates two novel datasets: first by injecting adversarial attacks in binary malware detection dataset named ADD-1 and second by injecting attacks in malware category detection dataset named ADD-2. Further, it provides an approach to detect adversarial static malware in smartphones utilizing different ML models (Random Forest (RF), Extreme Gradient Boosting (XGB), Decision Tree (DT) and Gradient Boosting (GB), ensemble voting, and Deep Neural Network (DNN) models. This study preprocessed data by analyzing and converting the categorical data into numerical values using the data normalization technique (i.e., standard scalar). According to the findings, the proposed XGB model predicts adversarial attacks with 88% accuracy and outperforms conventional ML and DL models.
引用
收藏
页码:3369 / 3384
页数:16
相关论文
共 41 条
[21]   Defending Deep Learning Models Against Adversarial Attacks [J].
Mani, Nag ;
Moh, Melody ;
Moh, Teng-Sheng .
INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2021, 13 (01) :72-89
[22]   Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions [J].
Naitali, Amal ;
Ridouani, Mohammed ;
Salahdine, Fatima ;
Kaabouch, Naima .
COMPUTERS, 2023, 12 (10)
[23]   The World of Malware: An Overview [J].
Namanya, Anita Patience ;
Cullen, Andrea ;
Awan, Irfan U. ;
Disso, Jules Pagna .
2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2018), 2018, :420-427
[24]   Dynamic Malware Analysis in the Modern Era-A State of the Art Survey [J].
Or-Meir, Ori ;
Nissim, Nir ;
Elovici, Yuval ;
Rokach, Lior .
ACM COMPUTING SURVEYS, 2019, 52 (05)
[25]   Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications [J].
Rashid, Md. Mamunur ;
Kamruzzaman, Joarder ;
Hassan, Mohammad Mehedi ;
Imam, Tasadduq ;
Wibowo, Santoso ;
Gordon, Steven ;
Fortino, Giancarlo .
COMPUTERS & SECURITY, 2022, 120
[26]   Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning [J].
Rathore, Hemant ;
Sahay, Sanjay K. ;
Nikam, Piyush ;
Sewak, Mohit .
INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) :867-882
[27]   A novel secure cooperative cognitive radio network based on Chebyshev map [J].
Ridouani, Mohammed ;
Benazzouza, Salma ;
Salahdine, Fatima ;
Hayar, Aawatif .
DIGITAL SIGNAL PROCESSING, 2022, 126
[28]  
Rigatti Steven J, 2017, J Insur Med, V47, P31, DOI [10.17849/insm-47-01-31-39.1, 10.17849/insm-47-01-31-39.1]
[29]   A roadmap for security challenges in the Internet of Things [J].
Sfar, Arbia Riahi ;
Natalizio, Enrico ;
Challal, Yacine ;
Chtourou, Zied .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) :118-137
[30]  
Shafiq M.O., 2019, ARXIV