Anti-malware engines under adversarial attacks

被引:2
|
作者
Selvaganapathy S. [1 ]
Sadasivam S. [2 ]
机构
[1] Department of Information Technology, PSG College of Technology, Coimbatore
[2] Department of Computer Science and Engineering, PSG College of Technology, Coimbatore
关键词
adversarial attacks; Android; deep neural network; Evasion attacks; malware detection;
D O I
10.1080/1206212X.2021.1940744
中图分类号
学科分类号
摘要
Mobile phones have crawled into our lives with such rapidity and have reformed our lives in a short span. Malware is entangled with all forms of mobile applications causing havoc and distress. State of the art malware detection systems have exercised learning-based techniques successfully to discriminate benign contents from malware. But, Machine Learning (ML) models are vulnerable to adversarial samples and are not intrinsically robust against adversarial attacks. The adversarial samples generated against ML models degrade the model's performance. Adversarial attacks are utilized by malware authors to hinder the working of ML-based malware detection approaches. This article coheres into the effects of evasion attacks on an anti-malware engine utilizing a feed forward deep neural network model. Experiments on Android malware apps is explored by structuring a comprehensive feature engineering scheme for the Drebin dataset through static analysis. The results demonstrate the realistic threat and demand the need to develop adaptive defenses to foster a secure learning model which is immune to adversarial attacks. © 2021 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:791 / 804
页数:13
相关论文
共 50 条
  • [21] Malware Economics and its Implication to Anti-Malware Situational Awareness
    Lakhotia, Arun
    Notani, Vivek
    LeDoux, Charles
    2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,
  • [22] Effectiveness of Android Obfuscation on Evading Anti-malware
    Chua, Melissa
    Balachandran, Vivek
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 143 - 145
  • [23] Using heuristic approach to build Anti-malware
    Alrammal, Muath
    Naveed, Munir
    Rihawi, Samer
    2018 FIFTH HCT INFORMATION TECHNOLOGY TRENDS (ITT): EMERGING TECHNOLOGIES FOR ARTIFICIAL INTELLIGENCE, 2018, : 191 - 196
  • [24] A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware
    Muhammad, Zia
    Amjad, Muhammad Faisal
    Abbas, Haider
    Iqbal, Zafar
    Azhar, Anique
    Yasin, Ahsan
    Iesar, Hasan
    2021 IEEE 19TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2021), 2021, : 117 - 124
  • [25] Malware vs Anti-Malware Battle - Gotta Evade 'em All!
    Chaffey, Emily J.
    Sgandurra, Daniele
    2020 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC 2020), 2020, : 40 - 44
  • [26] RkFinder: A practical anti-malware system based on VMM
    Chen, Lin
    Liu, Bo
    Hu, Huaping
    Zhang, jing
    International Journal of Digital Content Technology and its Applications, 2012, 6 (19) : 530 - 537
  • [27] Adversarial Attacks on Mobile Malware Detection
    Shahpasand, Maryam
    Hamey, Len
    Vatsalan, Dinusha
    Xue, Minhui
    2019 IEEE 1ST INTERNATIONAL WORKSHOP ON ARTIFICIAL INTELLIGENCE FOR MOBILE (AI4MOBILE '19), 2019, : 17 - 20
  • [28] A Survey on Adversarial Attacks for Malware Analysis
    Aryal, Kshitiz
    Gupta, Maanak
    Abdelsalam, Mahmoud
    Kunwar, Pradip
    Thuraisingham, Bhavani
    IEEE ACCESS, 2025, 13 : 428 - 459
  • [29] Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique
    Xue, Yinxing
    Meng, Guozhu
    Liu, Yang
    Tan, Tian Huat
    Chen, Hongxu
    Sun, Jun
    Zhang, Jie
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) : 1529 - 1544
  • [30] Comprehensive review and analysis of anti-malware apps for smartphones
    Talal, Mohammed
    Zaidan, A. A.
    Zaidan, B. B.
    Albahri, O. S.
    Alsalem, M. A.
    Albahri, A. S.
    Alamoodi, A. H.
    Kiah, M. L. M.
    Jumaah, F. M.
    Alaa, Mussab
    TELECOMMUNICATION SYSTEMS, 2019, 72 (02) : 285 - 337