Disarming visualization-based approaches in malware detection systems

被引:13
作者
Fasci, Lara Saidia [1 ]
Fisichella, Marco [2 ]
Lax, Gianluca [1 ]
Qian, Chenyi [2 ]
机构
[1] Univ Reggio Calabria, DIIES Dept, I-89122 Reggio Di Calabria, Italy
[2] Leibniz Univ Hannover, L3S Res Ctr, Appelstr 9A, D-30167 Hannover, Germany
关键词
Malware classification; Machine learning; Deep learning; GAN;
D O I
10.1016/j.cose.2022.103062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visualization-based approaches have recently been used in conjunction with signature-based techniques to detect variants of malware files. Indeed, it is sufficient to modify some byte of executable files to modify the signature and, thus, to elude a signature-based detector. In this paper, we design a GAN-based architecture that allows an attacker to generate variants of a malware in which the malware patterns found by visualization-based approaches are hidden, thus producing a new version of the malware that is not detected by both signature-based and visualization-based techniques. The experiments carried out on a well-known malware dataset show a success rate of 100% in generating new variants of malware files that are not detected from the state-of-the-art visualization-based technique. (c) 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:13
相关论文
共 41 条
[1]   Malware Detection Issues, Challenges, and Future Directions: A Survey [J].
Aboaoja, Faitouri A. ;
Zainal, Anazida ;
Ghaleb, Fuad A. ;
Al-rimy, Bander Ali Saleh ;
Eisa, Taiseer Abdalla Elfadil ;
Elnour, Asma Abbas Hassan .
APPLIED SCIENCES-BASEL, 2022, 12 (17)
[2]  
[Anonymous], 2018, Int. J. Educ. Manage. Eng.
[3]  
Arjovsky M, 2017, PR MACH LEARN RES, V70
[4]   On the Effectiveness of Image Processing Based Malware Detection Techniques [J].
Bijitha, C., V ;
Nath, Hiran, V .
CYBERNETICS AND SYSTEMS, 2022, 53 (07) :615-640
[5]  
Cai ZP, 2021, Arxiv, DOI arXiv:2106.03785
[6]  
Claroty, 2021, SEC RES REV STAGG MA
[7]  
Code Repository, 2022, PROJ COD
[8]   A comparison of static, dynamic, and hybrid analysis for malware detection [J].
Damodaran A. ;
Troia F.D. ;
Visaggio C.A. ;
Austin T.H. ;
Stamp M. .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (01) :1-12
[9]  
Ding G.W., 2019, ICLR (Poster)
[10]  
DriverPack Solution, 2022, DRIV