An Adversarial Attack on ML-Based IoT Malware Detection Using Binary Diversification Techniques

被引:1
作者
Mwangi, Maina Bernard [1 ]
Cheng, Shin-Ming [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 10607, Taiwan
关键词
Adversarial attack; binary diversification; Internet of Things (IoT) malware detection; machine learning;
D O I
10.1109/ACCESS.2024.3513713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of machine learning (ML) has revolutionized malware detection, enabling accurate identification of subtle distinctions between malware and benignware. As the threat landscape continually evolves and new malware strains emerge, conventional signature-based detectors are becoming increasingly inadequate, leading to a growing reliance on ML-based detectors. However, ML-based detection systems are particularly vulnerable to adversarial attacks, where subtle alterations to input samples can deceive detectors into misclassifying malware as benignware, highlighting the need for robustness studies, as such misclassifications can lead to significant damage. To this end, we stage a black-box attack on IoT malware detection systems, specifically targeting structure-based detectors, which are predominant due to their ability to detect malware across diverse CPU architectures in IoT environments. Our strategy employs semantic-preserving binary diversification techniques, including function inlining, branch function insertion, control flow graph flattening, and basic block merging and reordering, to modify malware binaries and evade detection. We train a multi-structural substitute detector (based on a combination of control flow graph and function call graph features) on a large-scale dataset of IoT ELF binaries, achieving detection rates of up to 98.24%. Using explainable AI (XAI), we transfer the attack to four structural target detectors, achieving evasion rates of up to 100% on certain detectors, with an average binary size increase of just 8.35%. The modified samples evade detection by a state-of-the-art adversarial detector and several commercial antivirus engines, highlighting the persistent challenge of defending against adversarial threats and emphasizing the need for enhanced and multi-faceted defense mechanisms.
引用
收藏
页码:185172 / 185186
页数:15
相关论文
共 71 条
[1]   Malware Detection in Cloud Infrastructures using Convolutional Neural Networks [J].
Abdelsalam, Mahmoud ;
Krishnan, Ram ;
Huang, Yufei ;
Sandhu, Ravi .
PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, :162-169
[2]  
Abusnaina A., 2021, arXiv
[3]   Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Khormali, Aminollah ;
Alasmary, Hisham ;
Park, Jeman ;
Anwar, Afsah ;
Mohaisen, Aziz .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :1296-1305
[4]   Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Alasmary, Hisham ;
Abuhamad, Mohammed ;
Salem, Saeed ;
Nyang, DaeHun ;
Mohaisen, Aziz .
COMPUTATIONAL DATA AND SOCIAL NETWORKS, 2019, 11917 :268-281
[5]   Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J].
Al-Dujaili, Abdullah ;
Huang, Alex ;
Hemberg, Erik ;
O'reilly, Una-May .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :76-82
[6]   MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks [J].
Al-Fawa'reh, Mohammad ;
Abu-Khalaf, Jumana ;
Szewczyk, Patryk ;
Kang, James Jin .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) :9610-9629
[7]   Malware Detection With Subspace Learning-Based One-Class Classification [J].
Al-Khshali, Hasan H. ;
Ilyas, Muhammad ;
Sohrab, Fahad ;
Gabbouj, Moncef .
IEEE ACCESS, 2024, 12 :81017-81029
[8]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[9]  
Anderson H. S., 2017, P BLACK HAT LAS VEG, P1
[10]  
[Anonymous], PBISWorld.com Book (2012). Available online: https://www.pbisworld.com/about/