A Defensive Strategy Against Android Adversarial Malware Attacks

被引:0
|
作者
Atedjio, Fabrice Setephin [1 ]
Lienou, Jean-Pierre [2 ]
Nelson, Frederica F. [3 ]
Shetty, Sachin S. [4 ]
Kamhoua, Charles A. [3 ]
机构
[1] Univ Dschang, Dept Math & Comp Sci, Dschang, Cameroon
[2] Univ Dschang, Inst Technol Fotso Victor Bandjoun, Dept Comp Engn, Dschang, Cameroon
[3] DEVCOM Army Res Lab, Adelphi, MD 20783 USA
[4] Old Dominion Univ, Dept Computat Modeling & Simulat Engn, Boulder, VA 23529 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Operating systems; Malware; Generative adversarial networks; Vectors; Generators; Feature extraction; Training; Random forests; Perturbation methods; Classification algorithms; Androids; Adversarial attack; Carlini-Wagner attack; generative adversarial network; android adversarial malware;
D O I
10.1109/ACCESS.2024.3494545
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the popularity of Android mobile devices over the past ten years, malicious Android applications have significantly increased. Systems utilizing machine learning techniques have been successfully applied for Android malware detection to counter the constantly changing Android malware threats. However, attackers have developed new strategies to circumvent these systems by using adversarial attacks. An attacker can carefully craft a malicious sample to deceive a classifier. Among the evasion attacks, there is the more potent one, which is based on solid optimization constraints: the Carlini-Wagner attack. Carlini-Wagner is an attack that uses margin loss, which is more efficient than cross-entropy loss. We propose a model based on the Wasserstein Generative Adversarial Network to prevent adversarial attacks in an Android field in a white box scenario. Experimental results show that our method can effectively prevent this type of attack.
引用
收藏
页码:169432 / 169441
页数:10
相关论文
共 50 条
  • [21] Robustness of Image-based Android Malware Detection Under Adversarial Attacks
    Darwaish, Asim
    Nait-Abdesselam, Farid
    Titouna, Chafiq
    Sattar, Sumera
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [22] Quantifying the Impact of Adversarial Evasion Attacks on Machine Learning Based Android Malware Classifiers
    Abaid, Zainab
    Kaafar, Mohamed Ali
    Jha, Sanjay
    2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2017, : 375 - 384
  • [23] Defending malware detection models against evasion based adversarial attacks
    Rathore, Hemant
    Sasan, Animesh
    Sahay, Sanjay K.
    Sewak, Mohit
    PATTERN RECOGNITION LETTERS, 2022, 164 : 119 - 125
  • [24] PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
    Li, Deqiang
    Cui, Shicheng
    Li, Yun
    Xu, Jia
    Xiao, Fu
    Xu, Shouhuai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 920 - 936
  • [25] Defending Hardware-Based Malware Detectors Against Adversarial Attacks
    Kuruvila, Abraham Peedikayil
    Kundu, Shamik
    Basu, Kanad
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (09) : 1727 - 1739
  • [26] Is Approximation Universally Defensive Against Adversarial Attacks in Deep Neural Networks?
    Siddique, Ayesha
    Hoque, Khaza Anuarul
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 364 - 369
  • [27] Adversarial Attacks on Mobile Malware Detection
    Shahpasand, Maryam
    Hamey, Len
    Vatsalan, Dinusha
    Xue, Minhui
    2019 IEEE 1ST INTERNATIONAL WORKSHOP ON ARTIFICIAL INTELLIGENCE FOR MOBILE (AI4MOBILE '19), 2019, : 17 - 20
  • [28] A Survey on Adversarial Attacks for Malware Analysis
    Aryal, Kshitiz
    Gupta, Maanak
    Abdelsalam, Mahmoud
    Kunwar, Pradip
    Thuraisingham, Bhavani
    IEEE ACCESS, 2025, 13 : 428 - 459
  • [29] EAGLE: Evasion Attacks Guided by Local Explanations Against Android Malware Classification
    Shu, Zhan
    Yan, Guanhua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3165 - 3182
  • [30] RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks
    Li, Yakang
    Hu, Yikun
    Wang, Yizhuo
    He, Yituo
    Lu, Haining
    Gu, Dawu
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING, SANER, 2023, : 639 - 650