Adversarial android malware detection for mobile multimedia applications in IoT environments

被引:20
作者
Taheri, Rahim [1 ]
Javidan, Reza [1 ]
Pooranian, Zahra [2 ]
机构
[1] Shiraz Univ Technol, Dept Comp Engn & Informat Technol, Shiraz, Iran
[2] Univ Padua, Dept Math, SPRITZ, Padua, Italy
关键词
IoT Environment; Adversarial malware detection; Perturbing training set; Deep learning; IoT malware detection;
D O I
10.1007/s11042-020-08804-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose two defense methods against adversarial attack to a malware detection system for mobile multimedia applications in IoT environments. They are Robust-NN and a combination of convolutional neural network and 1- nearest neighbors(C4N) which modify training data that has been poisoned by an adversarial attack. As a result, the trained machine learning model will be accurate and if the malicious program is entered by any IoT device, the model generates necessary alerts. We provide an explanation of the used attack method and the algorithms proposed to defend against this attack. In order to evaluate the suitability of the proposed defense methods, sufficient analysis is presented, i.e. Drebin, Contagio and Genome datasets which include benign and malware Android apps are applied to perform experiments. To confirm the effectiveness of the suggested defense algorithms, this paper compared their performance with two state-of-the-art defense algorithms used to detect adversarial samples, namely e2SAD and EAT. The experiments are performed on two types of API and Permission features from the mentioned datasets. The results confirm that accuracy rates of classification algorithms decrease to 40% after attack in some cases (related to Drebin dataset by reviewing API feature sets). Additionally, the accuracy rates increase to 94.94% and 96.03% by applying Robust-NN and C4N algorithms, respectively. Therefore, they are comparable with existing cutting-edge defense algorithms. Also, the adversarial attack increased the FPR to 45.81% which will be reduced to 4.84% and 4.15% using Robust-NN and C4N, respectively. Consequently, the proposed methods will be robust against adversarial attacks.
引用
收藏
页码:16713 / 16729
页数:17
相关论文
共 25 条
[1]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[2]  
Bazrafshan Z, 2013, 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), P113, DOI 10.1109/IKT.2013.6620049
[3]   Adversarial image detection in deep neural networks [J].
Carrara, Fabio ;
Falchi, Fabrizio ;
Caldelli, Roberto ;
Amato, Giuseppe ;
Becarelli, Rudy .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (03) :2815-2835
[4]  
Chang T.-J., 2018, ARXIV181003739
[5]  
CHEN X, 2019, IEEE T INFORM FORENS
[6]  
Demetrio L., 2019, 3 ITALIAN C CYBER SE, V2315, P1
[7]  
Dinakarrao SMP, 2019, DES AUT TEST EUROPE, P776, DOI [10.23919/DATE.2019.8715057, 10.23919/date.2019.8715057]
[8]   Fuzzy pattern tree for edge malware detection and categorization in IoT [J].
Dovom, Ensieh Modiri ;
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Newton, David Ellis ;
Parizi, Reza M. ;
Karimipour, Hadis .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 97 :1-7
[9]  
FAN W, 2019, MULTIMED TOOLS APPL, P1
[10]  
Goodfellow I.J., 2014, ARXIV 14126572