Adversarial Samples on Android Malware Detection Systems for IoT Systems

被引:49
作者
Liu, Xiaolei [1 ]
Du, Xiaojiang [2 ]
Zhang, Xiaosong [1 ]
Zhu, Qingxin [1 ]
Wang, Hao [3 ]
Guizani, Mohsen [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Sichuan, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Norwegian Univ Sci & Technol, Dept Comp Sci, N-7491 Trondheim, Norway
[4] Qatar Univ, Dept Comp Sci & Engn, Doha 2713, Qatar
基金
中国国家自然科学基金;
关键词
Internet of Things; malware detection; adversarial samples; machine learning; KEY MANAGEMENT SCHEME; SECURITY;
D O I
10.3390/s19040974
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. However, these learning-based detection models are often vulnerable to adversarial samples. An automated testing framework is needed to help these learning-based malware detection systems for IoT devices perform security analysis. The current methods of generating adversarial samples mostly require training parameters of models and most of the methods are aimed at image data. To solve this problem, we propose a testing framework for learning-based Android malware detection systems (TLAMD) for IoT Devices. The key challenge is how to construct a suitable fitness function to generate an effective adversarial sample without affecting the features of the application. By introducing genetic algorithms and some technical improvements, our test framework can generate adversarial samples for the IoT Android application with a success rate of nearly 100% and can perform black-box testing on the system.
引用
收藏
页数:15
相关论文
共 40 条
[1]   Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J].
Al-Dujaili, Abdullah ;
Huang, Alex ;
Hemberg, Erik ;
O'reilly, Una-May .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :76-82
[2]   A Fuzzy Classifier-Based Penetration Testing for Web Applications [J].
Alhassan, J. K. ;
Misra, Sanjay ;
Umar, A. ;
Maskeliunas, Rytis ;
Damasevicius, Robertas ;
Adewumi, Adewole .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY & SYSTEMS (ICITS 2018), 2018, 721 :95-104
[3]   Feature weighting and SVM parameters optimization based on genetic algorithms for classification problems [J].
Anh Viet Phan ;
Minh Le Nguyen ;
Lam Thu Bui .
APPLIED INTELLIGENCE, 2017, 46 (02) :455-469
[4]  
[Anonymous], 2017 INT C EL COMM C
[5]  
[Anonymous], 2014, J APPL MATH, DOI DOI 10.1155/2014/594501
[6]  
[Anonymous], 2017, ARXIV170301340
[7]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[8]  
Aswini AM, 2015, J INF ASSUR SECUR, V10, P14
[9]   The security of machine learning [J].
Barreno, Marco ;
Nelson, Blaine ;
Joseph, Anthony D. ;
Tygar, J. D. .
MACHINE LEARNING, 2010, 81 (02) :121-148
[10]  
Biggio B, 2013, INT CONF BIOMETR