Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection

被引:0
作者
Wang, Fangwei [1 ,2 ]
Lu, Yuanyuan [1 ]
Wang, Changguang [1 ,2 ]
Li, Qingru [1 ,2 ]
机构
[1] Hebei Normal Univ, Coll Comp & Cyber Secur, Shijiazhuang 050024, Hebei, Peoples R China
[2] Key Lab Network & Informat Secur Hebei Prov, Shijiazhuang 050024, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
SIMILARITY;
D O I
10.1155/2021/8736946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5G is about to open Pandora's box of security threats to the Internet of Things (IoT). Key technologies, such as network function virtualization and edge computing introduced by the 5G network, bring new security threats and risks to the Internet infrastructure. Therefore, higher detection and defense against malware are required. Nowadays, deep learning (DL) is widely used in malware detection. Recently, research has demonstrated that adversarial attacks have posed a hazard to DL-based models. The key issue of enhancing the antiattack performance of malware detection systems that are used to detect adversarial attacks is to generate effective adversarial samples. However, numerous existing methods to generate adversarial samples are manual feature extraction or using white-box models, which makes it not applicable in the actual scenarios. This paper presents an effective binary manipulation-based attack framework, which generates adversarial samples with an evolutionary learning algorithm. The framework chooses some appropriate action sequences to modify malicious samples. Thus, the modified malware can successfully circumvent the detection system. The evolutionary algorithm can adaptively simplify the modification actions and make the adversarial sample more targeted. Our approach can efficiently generate adversarial samples without human intervention. The generated adversarial samples can effectively combat DL-based malware detection models while preserving the consistency of the executable and malicious behavior of the original malware samples. We apply the generated adversarial samples to attack the detection engines of VirusTotal. Experimental results illustrate that the adversarial samples generated by our method reach an evasion success rate of 47.8%, which outperforms other attack methods. By adding adversarial samples in the training process, the MalConv network is retrained. We show that the detection accuracy is improved by 10.3%.
引用
收藏
页数:9
相关论文
共 42 条
[21]   AMalNet: A deep learning framework based on graph convolutional networks for malware detection [J].
Pei, Xinjun ;
Yu, Long ;
Tian, Shengwei .
COMPUTERS & SECURITY, 2020, 93
[22]   On Effectiveness of Adversarial Examples and Defenses for Malware Classification [J].
Podschwadt, Robert ;
Takabi, Hassan .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 :380-393
[23]   A Survey on Access Control in the Age of Internet of Things [J].
Qiu, Jing ;
Tian, Zhihong ;
Du, Chunlai ;
Zuo, Qi ;
Su, Shen ;
Fang, Binxing .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) :4682-4696
[24]  
Raff E. etal., 2018, Malware detection by eating a whole exe, P268
[25]   Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning [J].
Rathore, Hemant ;
Sahay, Sanjay K. ;
Nikam, Piyush ;
Sewak, Mohit .
INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) :867-882
[26]  
Saxe J, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P11, DOI 10.1109/MALWARE.2015.7413680
[27]   CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques [J].
Shafiq, Muhammad ;
Tian, Zhihong ;
Bashir, Ali Kashif ;
Du, Xiaojiang ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) :3242-3254
[28]   Data mining and machine learning methods for sustainable smart cities traffic classification: A survey [J].
Shafiq, Survey Muhammad ;
Tian, Zhihong ;
Bashir, Ali Kashif ;
Jolfaei, Alireza ;
Yu, Xiangzhan .
SUSTAINABLE CITIES AND SOCIETY, 2020, 60
[29]   Malware Detection Using 1-Dimensional Convolutional Neural Networks [J].
Sharma, Arindam ;
Malacaria, Pasquale ;
Khouzani, M. H. R. .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, :247-256
[30]  
Song W., 2020, AUTOMATIC GENERATION