Enhanced Dynamic Analysis for Malware Detection With Gradient Attack

被引:0
|
作者
Yan, Pei [1 ,2 ]
Tan, Shunquan [3 ]
Wang, Miaohui [1 ,2 ]
Huang, Jiwu [4 ]
机构
[1] Shenzhen Key Lab Media Secur, Shenzhen 518000, Peoples R China
[2] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen City Polytech, Sch Informat & Commun Technol, Shenzhen 518116, Peoples R China
[4] Shenzhen MSU BIT Univ, Guangdong Lab Machine Percept & Intelligent Comp, Fac Comp, Shenzhen 518116, Peoples R China
关键词
Malware; Training; Noise; Feature extraction; Application programming interfaces; Perturbation methods; Backpropagation; Vocabulary; Vectors; Accuracy; Adversarial method; dynamic analysis; malware detection; network security;
D O I
10.1109/LSP.2024.3475354
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malware detection is an effective way to prevent the intrusion of malware into computer systems, and the API-based dynamic analysis method can effectively detect obfuscated and packaged malware. However, existing methods still suffer from limited detection accuracy and weak generalization. To address this issue, this paper presents a gradient attack-based malware dynamic analysis method. Through exerting adversarial noise into the embedding layer, the malware detection model can learn more robust representations of API sequences during training, achieving broader coverage of sample representations. The strategy of normalizing attack noise and recovering attacked representation is designed, which controls the strength of the gradient attack within a reasonable range and prevents a negative impact on the model's detection performance. The proposed method can be applied to existing API-based malware detection models to enhance their detection performance, indicating the strong generality of the proposed method. Experimental results on two benchmark datasets (i.e., Aliyun and Catak) demonstrate the effectiveness of the proposed gradient attack method, which further improves the detection performance of the mainstream API-based models, with an average accuracy increase of 2.80% and 3.66% on these two datasets, respectively.
引用
收藏
页码:2825 / 2829
页数:5
相关论文
共 50 条
  • [1] Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models
    Stokes, Jack W.
    Wang, De
    Marinescu, Mady
    Marino, Marc
    Bussone, Brian
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 102 - 109
  • [2] A Dynamic Game Solution to Malware Attack
    Khouzani, M. H. R.
    Sarkar, Saswati
    Altman, Eitan
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2138 - 2146
  • [3] Attack Tree Based Android Malware Detection with Hybrid Analysis
    Zhao, Shuai
    Li, Xiaohong
    Xu, Guangquan
    Zhang, Lei
    Feng, Zhiyong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 380 - 387
  • [4] Malware Detection in Android based on Dynamic Analysis
    Bhatia, Taniya
    Kaushal, Rishabh
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [5] Integrated static and dynamic analysis for malware detection
    Shijo, P. V.
    Salim, A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 804 - 811
  • [6] A comparison of static, dynamic, and hybrid analysis for malware detection
    Damodaran A.
    Troia F.D.
    Visaggio C.A.
    Austin T.H.
    Stamp M.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (1) : 1 - 12
  • [7] Detection of Android Malware: Combined with Static Analysis and. Dynamic Analysis
    Su, Ming-Yang
    Fung, Kek-Tung
    Huang, Yu-Hao
    Kang, Ming-Zhi
    Chung, Yen-Heng
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 1013 - 1018
  • [8] Dynamic malware detection and phylogeny analysis using process mining
    Bernardi, Mario Luca
    Cimitile, Marta
    Distante, Damiano
    Martinelli, Fabio
    Mercaldo, Francesco
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (03) : 257 - 284
  • [9] Dynamic malware detection and phylogeny analysis using process mining
    Mario Luca Bernardi
    Marta Cimitile
    Damiano Distante
    Fabio Martinelli
    Francesco Mercaldo
    International Journal of Information Security, 2019, 18 : 257 - 284
  • [10] Graph-based malware detection using dynamic analysis
    Anderson, Blake
    Quist, Daniel
    Neil, Joshua
    Storlie, Curtis
    Lane, Terran
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 247 - 258