Adversarial ELF Malware Detection Method Using Model Interpretation

被引:8
作者
Qiao, Yanchen [1 ]
Zhang, Weizhe [1 ,2 ]
Tian, Zhicheng [2 ]
Yang, Laurence T. [3 ]
Liu, Yang [2 ]
Alazab, Mamoun [4 ]
机构
[1] Peng Cheng Lab, Dept New Networks, Shenzhen 518000, Peoples R China
[2] Harbin Inst Technol Shenzhen, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[3] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
[4] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia
基金
中国国家自然科学基金;
关键词
Malware; Analytical models; Deep learning; Ground penetrating radar; Geophysical measurement techniques; Training; Feature extraction; Artificial neural networks; computer security; invasive software; smart devices;
D O I
10.1109/TII.2022.3192901
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research shows that executable and linkable format (ELF) malware detection models based on deep learning are vulnerable to adversarial attacks. The most commonly used method in previous work is adversarial training to defend adversarial examples. Nevertheless, it is inefficient and only effective for specific adversarial attacks. Given that the perturbation byte insertion positions of existing adversarial malware generation methods are relatively fixed, we propose a new method to detect adversarial ELF malware. Using model interpretation techniques, we analyze the decision-making basis of the malware detection model and extract the features of adversarial examples. We further use anomaly detection techniques to identify adversarial examples. As an add-on module of the malware detection model, the proposed method does not require modifying the original model and does not need to retrain the model. Evaluating results show that the method can effectively defend the adversarial attacks against the malware detection model.
引用
收藏
页码:605 / 615
页数:11
相关论文
共 44 条
  • [1] Abou-Assaleh T, 2004, P INT COMP SOFTW APP, P41
  • [2] Static malware detection and attribution in android byte-code through an end-to-end deep system
    Amin, Muhammad
    Tanveer, Tamleek Ali
    Tehseen, Mohammad
    Khan, Murad
    Khan, Fakhri Alam
    Anwar, Sajid
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 112 - 126
  • [3] Amodei D, 2016, PR MACH LEARN RES, V48
  • [4] [Anonymous], EETimes
  • [5] Malware Classification Using Deep Learning Methods
    Cakir, Bugra
    Dogdu, Erdogan
    [J]. ACMSE '18: PROCEEDINGS OF THE ACMSE 2018 CONFERENCE, 2018,
  • [6] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [7] Chua ZL, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P99
  • [8] Detection of Malicious Code Variants Based on Deep Learning
    Cui, Zhihua
    Xue, Fei
    Cai, Xingjuan
    Cao, Yang
    Wang, Gai-ge
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) : 3187 - 3196
  • [9] Dauphin YN, 2017, PR MACH LEARN RES, V70
  • [10] Demetrio L, 2019, Arxiv, DOI [arXiv:1901.03583, DOI 10.48550/ARXIV.1901.03583]