Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning

被引:50
作者
Rathore, Hemant [1 ]
Sahay, Sanjay K. [1 ]
Nikam, Piyush [1 ]
Sewak, Mohit [1 ]
机构
[1] BITS Pilani, Dept CS & IS, Goa Campus, Pilani, Rajasthan, India
关键词
Adversarial learning; Android; Malware detection; Machine learning; Reinforcement learning; Static analysis;
D O I
10.1007/s10796-020-10083-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the inception of Andoroid OS, smartphones sales have been growing exponentially, and today it enjoys the monopoly in the smartphone marketplace. The widespread adoption of Android smartphones has drawn the attention of malware designers, which threatens the Android ecosystem. The current state-of-the-art Android malware detection systems are based on machine learning and deep learning models. Despite having superior performance, these models are susceptible to adversarial attack. Therefore in this paper, we developed eight Android malware detection models based on machine learning and deep neural network and investigated their robustness against the adversarial attacks. For the purpose, we created new variants of malware using Reinforcement Learning, which will be misclassified as benign by the existing Android malware detection models. We propose two novel attack strategies, namely single policy attack and multiple policy attack using reinforcement learning for white-box and grey-box scenario respectively. Putting ourselves in adversary' shoes, we designed adversarial attacks on the detection models with the goal of maximising fooling rate, while making minimum modifications to the Android application and ensuring that the app's functionality and behaviour does not change. We achieved an average fooling rate of 44.21% and 53.20% across all the eight detection models with maximum five modifications using a single policy attack and multiple policy attack, respectively. The highest fooling rate of 86.09% with five changes was attained against the decision tree based model using the multiple policy approach. Finally, we propose an adversarial defence strategy which reduces the average fooling rate by threefold to 15.22% against a single policy attack, thereby increasing the robustness of the detection models i.e. the proposed model can effectively detect variants (metamorphic) of malware. The experimental analysis shows that our proposed Android malware detection system using reinforcement learning is more robust against adversarial attacks.
引用
收藏
页码:867 / 882
页数:16
相关论文
共 38 条
  • [1] Clustering-Aided Multi-View Classification: A Case Study on Android Malware Detection
    Appice, Annalisa
    Andresini, Giuseppina
    Malerba, Donato
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2020, 55 (01) : 1 - 26
  • [2] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [3] SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System
    Arshad, Saba
    Shah, Munam A.
    Wahid, Abdul
    Mehmood, Amjad
    Song, Houbing
    Yu, Hongnian
    [J]. IEEE ACCESS, 2018, 6 : 4321 - 4339
  • [4] AVTEST, 2019, MALW
  • [5] Biggio B., 2013, Lecture Notes in Comput Sci, DOI [10.1007/978-3-642-40994-325, DOI 10.1007/978-3-642-40994-325, DOI 10.1007/978-3-642-40994-3_25]
  • [6] Chinavle Deepak., 2009, Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM '09, P2015
  • [7] DroidScribe: Classifying Android Malware Based on Runtime Behavior
    Dash, Santanu Kumar
    Suarez-Tangil, Guillermo
    Khan, Salahuddin
    Tam, Kimberly
    Ahmadi, Mansour
    Kinder, Johannes
    Cavallaro, Lorenzo
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 252 - 261
  • [8] Android Security: A Survey of Issues, Malware Penetration, and Defenses
    Faruki, Parvez
    Bharmal, Ammar
    Laxmi, Vijay
    Ganmoor, Vijay
    Gaur, Manoj Singh
    Conti, Mauro
    Rajarajan, Muttukrishnan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 998 - 1022
  • [9] Fonteneau R, 2010, ICAART 2010: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 1: ARTIFICIAL INTELLIGENCE, P64
  • [10] G DATA CyberDefense AG, 2019, MOB MALW REP