A Defensive Strategy Against Android Adversarial Malware Attacks

被引:0
作者
Atedjio, Fabrice Setephin [1 ]
Lienou, Jean-Pierre [2 ]
Nelson, Frederica F. [3 ]
Shetty, Sachin S. [4 ]
Kamhoua, Charles A. [3 ]
机构
[1] Univ Dschang, Dept Math & Comp Sci, Dschang, Cameroon
[2] Univ Dschang, Inst Technol Fotso Victor Bandjoun, Dept Comp Engn, Dschang, Cameroon
[3] DEVCOM Army Res Lab, Adelphi, MD 20783 USA
[4] Old Dominion Univ, Dept Computat Modeling & Simulat Engn, Boulder, VA 23529 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Operating systems; Malware; Generative adversarial networks; Vectors; Generators; Feature extraction; Training; Random forests; Perturbation methods; Classification algorithms; Androids; Adversarial attack; Carlini-Wagner attack; generative adversarial network; android adversarial malware;
D O I
10.1109/ACCESS.2024.3494545
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the popularity of Android mobile devices over the past ten years, malicious Android applications have significantly increased. Systems utilizing machine learning techniques have been successfully applied for Android malware detection to counter the constantly changing Android malware threats. However, attackers have developed new strategies to circumvent these systems by using adversarial attacks. An attacker can carefully craft a malicious sample to deceive a classifier. Among the evasion attacks, there is the more potent one, which is based on solid optimization constraints: the Carlini-Wagner attack. Carlini-Wagner is an attack that uses margin loss, which is more efficient than cross-entropy loss. We propose a model based on the Wasserstein Generative Adversarial Network to prevent adversarial attacks in an Android field in a white box scenario. Experimental results show that our method can effectively prevent this type of attack.
引用
收藏
页码:169432 / 169441
页数:10
相关论文
共 35 条
  • [1] Barnett SA, 2018, Arxiv, DOI arXiv:1806.11382
  • [2] Extreme Gradient Boosting-Based Machine Learning Approach for Green Building Cost Prediction
    Alshboul, Odey
    Shehadeh, Ali
    Almasabha, Ghassan
    Almuflih, Ali Saeed
    [J]. SUSTAINABILITY, 2022, 14 (11)
  • [3] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [4] The security of machine learning
    Barreno, Marco
    Nelson, Blaine
    Joseph, Anthony D.
    Tygar, J. D.
    [J]. MACHINE LEARNING, 2010, 81 (02) : 121 - 148
  • [5] Random forest in remote sensing: A review of applications and future directions
    Belgiu, Mariana
    Dragut, Lucian
    [J]. ISPRS JOURNAL OF PHOTOGRAMMETRY AND REMOTE SENSING, 2016, 114 : 24 - 31
  • [6] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [7] Chen LW, 2018, 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), P782, DOI 10.1109/ASONAM.2018.8508284
  • [8] Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
    Demontis, Ambra
    Melis, Marco
    Biggio, Battista
    Maiorca, Davide
    Arp, Daniel
    Rieck, Konrad
    Corona, Igino
    Giacinto, Giorgio
    Roli, Fabio
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 711 - 724
  • [9] Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
  • [10] Grosse K, 2016, Arxiv, DOI [arXiv:1606.04435, DOI 10.48550/ARXIV.1606.04435]