Defense against adversarial malware using robust classifier: DAM-ROC

被引:1
作者
Selvaganapathy, Shymala Gowri [1 ]
Sadasivam, Sudha [2 ]
机构
[1] PSG Coll Technol, Dept Informat Technol, Coimbatore 641004, Tamil Nadu, India
[2] PSG Coll Technol, Dept Comp Sci & Engn, Coimbatore 641004, Tamil Nadu, India
来源
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES | 2022年 / 47卷 / 04期
关键词
Adversarial machine learning; Neural networks; robust malware detection; evasion attacks; anti-malware engine; Bayesian neural network; uncertainty quantification; DEEP NEURAL-NETWORKS; ATTACKS; FRAMEWORK;
D O I
10.1007/s12046-022-01980-6
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Malware authors focus on deceiving and evading Anti Malware Engines (AME). Evasion attacks take in malware samples and modify those samples to by-pass ml based AME. Existing learning based anti-malware solutions are either too limited or insufficient to neutralize the threats arising from evasion attacks. This has necessitated a more comprehensive and robust solution. This research attempts to develop a secure learning framework entitled, damroc. The objective is to shield anti-malware entities against evasion attacks by making use of an adaptive adversarial training framework with novel retraining sample selector, (DAM-ROC OR) for dnn based learners. Usage of bnn along with possible quantification of predictive uncertainties is adapted. This generic framework, DAM-ROC is evaluated on benchmarked Android and Windows datasets to explore necessary trade-off between performance and robustness. DAM-ROC models are retrained to defend against gradient attacks like rBIMk, dBIMk, GRAMS and JSMA. Empirical results show that proposed DAM-ROC framework could increase robustness against multiple evasion attacks without compromising on performance when compared against two existing frameworks, SLEIPNIR and KBL. GRAMS retrained Bayesian models have demonstrated consistent performance against all considered attacks which is crucial for real world scenarios since it cannot be predicted in advance which attack will be deployed.
引用
收藏
页数:49
相关论文
共 94 条
  • [1] Abdar M, 2021, Arxiv, DOI [arXiv:2011.06225, DOI 10.1016/J.INFFUS.2021.05.008]
  • [2] Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
    Al-Dujaili, Abdullah
    Huang, Alex
    Hemberg, Erik
    O'reilly, Una-May
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 76 - 82
  • [3] Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
  • [4] Towards Improving Robustness of Deep Neural Networks to Adversarial Perturbations
    Amini, Sajjad
    Ghaemmaghami, Shahrokh
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 22 (07) : 1889 - 1903
  • [5] [Anonymous], 2019, MALWARE CHALLENGE
  • [6] [Anonymous], 2008, LEET
  • [7] [Anonymous], 2022, SOPHOS
  • [8] Bai T, 2021, Arxiv, DOI [arXiv:2102.01356, 10.48550/arXiv.2102.01356, DOI 10.48550/ARXIV.2102.01356]
  • [9] Bayes T., 1763, Philosophical Transactions of the Royal Society, V53, P370, DOI [DOI 10.1098/RSTL.1763.0053, 10.1098/rstl.1763.0053]
  • [10] Berger JO., 2013, STAT DECISION THEORY, DOI DOI 10.1007/978-1-4757-4286-2