Enhanced Dynamic Analysis for Malware Detection With Gradient Attack

被引:0
|
作者
Yan, Pei [1 ,2 ]
Tan, Shunquan [3 ]
Wang, Miaohui [1 ,2 ]
Huang, Jiwu [4 ]
机构
[1] Shenzhen Key Lab Media Secur, Shenzhen 518000, Peoples R China
[2] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen City Polytech, Sch Informat & Commun Technol, Shenzhen 518116, Peoples R China
[4] Shenzhen MSU BIT Univ, Guangdong Lab Machine Percept & Intelligent Comp, Fac Comp, Shenzhen 518116, Peoples R China
关键词
Malware; Training; Noise; Feature extraction; Application programming interfaces; Perturbation methods; Backpropagation; Vocabulary; Vectors; Accuracy; Adversarial method; dynamic analysis; malware detection; network security;
D O I
10.1109/LSP.2024.3475354
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malware detection is an effective way to prevent the intrusion of malware into computer systems, and the API-based dynamic analysis method can effectively detect obfuscated and packaged malware. However, existing methods still suffer from limited detection accuracy and weak generalization. To address this issue, this paper presents a gradient attack-based malware dynamic analysis method. Through exerting adversarial noise into the embedding layer, the malware detection model can learn more robust representations of API sequences during training, achieving broader coverage of sample representations. The strategy of normalizing attack noise and recovering attacked representation is designed, which controls the strength of the gradient attack within a reasonable range and prevents a negative impact on the model's detection performance. The proposed method can be applied to existing API-based malware detection models to enhance their detection performance, indicating the strong generality of the proposed method. Experimental results on two benchmark datasets (i.e., Aliyun and Catak) demonstrate the effectiveness of the proposed gradient attack method, which further improves the detection performance of the mainstream API-based models, with an average accuracy increase of 2.80% and 3.66% on these two datasets, respectively.
引用
收藏
页码:2825 / 2829
页数:5
相关论文
共 50 条
  • [21] Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model
    Jeon, Jueun
    Park, Jong Hyuk
    Jeong, Young-Sik
    IEEE ACCESS, 2020, 8 : 96899 - 96911
  • [22] Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis
    Sihwail, Rami
    Omar, Khairuddin
    Ariffin, Khairul Akram Zainol
    Al Afghani, Sanad
    APPLIED SCIENCES-BASEL, 2019, 9 (18):
  • [23] A Collaborative Framework for Android Malware Detection using DNS & Dynamic Analysis
    Somarriba, Oscar
    Zurutuza, Urko
    2017 IEEE 37TH CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXVII), 2017,
  • [24] Mobile Malware Visual Analytics and Similarities of Attack Toolkits (Malware Gene Analysis)
    Paturi, Anand
    Cherukuri, Manoj
    Donahue, John
    Mukkamala, Srinivas
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2013, : 149 - 154
  • [25] Are Malware Detection Models Adversarial Robust Against Evasion Attack?
    Rathore, Hemant
    Samavedhi, Adithya
    Sahay, Sanjay K.
    Sewak, Mohit
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [26] Structural Attack against Graph Based Android Malware Detection
    Zhao, Kaifa
    Zhou, Hao
    Zhu, Yulin
    Zhan, Xian
    Zhou, Kai
    Li, Jianfeng
    Yu, Le
    Yuan, Wei
    Luo, Xiapu
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3218 - 3235
  • [27] Universal backdoor attack on deep neural networks for malware detection
    Zhang, Yunchun
    Feng, Fan
    Liao, Zikun
    Li, Zixuan
    Yao, Shaowen
    APPLIED SOFT COMPUTING, 2023, 143
  • [28] The Concept of Attack Scenarios and its Applications in Android Malware Detection
    Chang, Yu-Chen
    Wang, Sheng-De
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 1485 - 1492
  • [29] Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection
    Sun R.
    Guo S.
    Xing C.
    Duan Y.
    Yang L.
    Guo X.
    Pan Z.
    PeerJ Computer Science, 2023, 9
  • [30] Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection
    Sun, Ruijin
    Guo, Shize
    Xing, Changyou
    Duan, Yexin
    Yang, Luming
    Guo, Xi
    Pan, Zhisong
    PEERJ COMPUTER SCIENCE, 2023, 9