Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

被引:85
作者
Li, Deqiang [1 ]
Li, Qianmu [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
关键词
Adversarial Machine Learning; Deep Neural Networks; Ensemble; Adversarial Malware Detection;
D O I
10.1109/TIFS.2020.3003571
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malware remains a big threat to cyber security, calling for machine learning based malware detection. While promising, such detectors are known to be vulnerable to evasion attacks. Ensemble learning typically facilitates countermeasures, while attackers can leverage this technique to improve attack effectiveness as well. This motivates us to investigate which kind of robustness the ensemble defense or effectiveness the ensemble attack can achieve, particularly when they combat with each other. We thus propose a new attack approach, named mixture of attacks, by rendering attackers capable of multiple generative methods and multiple manipulation sets, to perturb a malware example without ruining its malicious functionality. This naturally leads to a new instantiation of adversarial training, which is further geared to enhancing the ensemble of deep neural networks. We evaluate defenses using Android malware detectors against 26 different attacks upon two practical datasets. Experimental results show that the new adversarial training significantly enhances the robustness of deep neural networks against a wide range of attacks, ensemble methods promote the robustness when base classifiers are robust enough, and yet ensemble attacks can evade the enhanced malware detectors effectively, even notably downgrading the VirusTotal service.
引用
收藏
页码:3886 / 3900
页数:15
相关论文
共 63 条
  • [1] Abbass Mohamed A., 2017, 2017 IEEE International Ultrasonics Symposium (IUS), DOI 10.1109/ULTSYM.2017.8092265
  • [2] Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
    Al-Dujaili, Abdullah
    Huang, Alex
    Hemberg, Erik
    O'reilly, Una-May
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 76 - 82
  • [3] Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
  • [4] [Anonymous], 2019, INT SEC THREAT REP 2
  • [5] [Anonymous], 2019, VirusTotal
  • [6] [Anonymous], 2019, APKTOOL
  • [7] [Anonymous], 2016, ARXIV161102770
  • [8] Araujo Alexandre, 2019, ARXIV190310219
  • [9] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [10] Athalye A, 2018, PR MACH LEARN RES, V80