A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method

被引:0
|
作者
Xue, Mingfu [1 ]
Fu, Jinlong [2 ]
Li, Zhiyuan [2 ]
Ni, Shifeng [2 ]
Wu, Heyi [3 ]
Zhang, Leo Yu [4 ]
Zhang, Yushu [2 ]
Liu, Weiqiang [5 ]
机构
[1] East China Normal Univ, Sch Commun & Elect Engn, Shanghai 200241, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[3] Sangfor Technol Inc, Shenzhen 215000, Peoples R China
[4] Griffith Univ, Sch Informat & Commun Technol, Southport, Qld 4215, Australia
[5] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Ground penetrating radar; Geophysical measurement techniques; Computer viruses; Operating systems; Software; Feature extraction; Linux; Engines; Viruses (medical); Reinforcement learning; Computer virus; ITAI system; ELF; reinforcement learning; adversarial malicious samples;
D O I
10.1109/JETCAS.2024.3481273
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, domestic Linux operating systems have developed rapidly, but the threat of ELF viruses has become increasingly prominent. Currently, domestic antivirus software for information technology application innovation (ITAI) operating systems shows insufficient capability in detecting ELF viruses. At the same time, research on generating malicious samples in ELF format is scarce. In order to fill this gap at home and abroad and meet the growing application needs of domestic antivirus software companies, this paper proposes an automatic ELF adversarial malicious samples generation technique based on reinforcement learning. Based on reinforcement learning framework, after being processed by cycles of feature extraction, malicious detection, agent decision-making, and evade-detection operation, the sample can evade the detection of antivirus engines. Specifically, nine feature extractor subclasses are used to extract features in multiple aspects. The PPO algorithm is used as the agent algorithm. The action table in the evade-detection module contains 11 evade-detection operations for ELF malicious samples. This method is experimentally verified on the ITAI operating system, and the ELF malicious sample set on the Linux x86 platform is used as the original sample set. The detection rate of this sample set by ClamAV before processing is 98%, and the detection rate drops to 25% after processing. The detection rate of this sample set by 360 Security before processing is 4%, and the detection rate drops to 1% after processing. Furthermore, after processing, the average number of engines on VirusTotal that could detect the maliciousness of the samples decreases from 39 to 15. Many malicious samples were detected by $41\sim 43$ engines on VirusTotal before processing, while after the evade-detection processing, only $8\sim 9$ engines on VirusTotal can detect the malware. In terms of executability and malicious function consistency, the processed samples can still run normally and the malicious functions remain consistent with those before processing. Overall, the proposed method in this paper can effectively generate adversarial ELF malware samples. Using this method to generate malicious samples to test and train the anti-virus software can promote and improve anti-virus software's detection and defense capability against malware.
引用
收藏
页码:743 / 757
页数:15
相关论文
共 50 条
  • [1] Dual adversarial learning-based virtual sample generation method for data expansion of soft senors
    Wang, Xiao
    Liu, Han
    Li, Longhao
    Zhang, Yong
    MEASUREMENT, 2022, 198
  • [2] Adversarial sample generation technology of malicious code based on LIME
    Huang T.
    Li C.
    Liu Y.
    Li D.
    Wen W.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 331 - 338
  • [3] Graph learning-based generation of abstractions for reinforcement learning
    Xue, Yuan
    Kudenko, Daniel
    Khosla, Megha
    NEURAL COMPUTING & APPLICATIONS, 2023,
  • [4] Reinforcement Learning-Based Cooperative Adversarial Algorithm for UAV Cluster
    Li, Yan
    Gao, Yanlong
    Dai, Xunhua
    Nian, Xiaohong
    Wang, Haibo
    Xiong, HongYun
    PROCEEDINGS OF 2022 INTERNATIONAL CONFERENCE ON AUTONOMOUS UNMANNED SYSTEMS, ICAUS 2022, 2023, 1010 : 1129 - 1138
  • [5] Infrared Adversarial Patch Generation Based on Reinforcement Learning
    Zhou, Shuangju
    Li, Yang
    Tan, Wenyi
    Zhao, Chenxing
    Zhou, Xin
    Pan, Quan
    MATHEMATICS, 2024, 12 (21)
  • [6] Adversarial malware sample generation method based on the prototype of deep learning detector
    Qiao, Yanchen
    Zhang, Weizhe
    Tian, Zhicheng
    Yang, Laurence T.
    Liu, Yang
    Alazab, Mamoun
    COMPUTERS & SECURITY, 2022, 119
  • [7] Adversarial robustness of deep reinforcement learning-based intrusion detection
    Merzouk, Mohamed Amine
    Neal, Christopher
    Delas, Josephine
    Yaich, Reda
    Boulahia-Cuppens, Nora
    Cuppens, Frederic
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (06) : 3625 - 3651
  • [8] An Adversarial Reinforcement Learning Framework for Robust Machine Learning-based Malware Detection
    Ebrahimi, Mohammadreza
    Li, Weifeng
    Chai, Yidong
    Pacheco, Jason
    Chen, Hsinchun
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW, 2022, : 567 - 576
  • [9] MacGAN: A Moment-Actor-Critic Reinforcement Learning-Based Generative Adversarial Network for Molecular Generation
    Tang, Huidong
    Li, Chen
    Jiang, Shuai
    Yu, Huachong
    Kamei, Sayaka
    Yamanishi, Yoshihiro
    Morimoto, Yasuhiko
    WEB AND BIG DATA, PT I, APWEB-WAIM 2023, 2024, 14331 : 127 - 141
  • [10] Adversarial Sample Generation Method Based on Chinese Features
    Li X.-G.
    Luo H.
    Sun Y.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 5143 - 5161