A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method

被引:0
|
作者
Xue, Mingfu [1 ]
Fu, Jinlong [2 ]
Li, Zhiyuan [2 ]
Ni, Shifeng [2 ]
Wu, Heyi [3 ]
Zhang, Leo Yu [4 ]
Zhang, Yushu [2 ]
Liu, Weiqiang [5 ]
机构
[1] East China Normal Univ, Sch Commun & Elect Engn, Shanghai 200241, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[3] Sangfor Technol Inc, Shenzhen 215000, Peoples R China
[4] Griffith Univ, Sch Informat & Commun Technol, Southport, Qld 4215, Australia
[5] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Ground penetrating radar; Geophysical measurement techniques; Computer viruses; Operating systems; Software; Feature extraction; Linux; Engines; Viruses (medical); Reinforcement learning; Computer virus; ITAI system; ELF; reinforcement learning; adversarial malicious samples;
D O I
10.1109/JETCAS.2024.3481273
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, domestic Linux operating systems have developed rapidly, but the threat of ELF viruses has become increasingly prominent. Currently, domestic antivirus software for information technology application innovation (ITAI) operating systems shows insufficient capability in detecting ELF viruses. At the same time, research on generating malicious samples in ELF format is scarce. In order to fill this gap at home and abroad and meet the growing application needs of domestic antivirus software companies, this paper proposes an automatic ELF adversarial malicious samples generation technique based on reinforcement learning. Based on reinforcement learning framework, after being processed by cycles of feature extraction, malicious detection, agent decision-making, and evade-detection operation, the sample can evade the detection of antivirus engines. Specifically, nine feature extractor subclasses are used to extract features in multiple aspects. The PPO algorithm is used as the agent algorithm. The action table in the evade-detection module contains 11 evade-detection operations for ELF malicious samples. This method is experimentally verified on the ITAI operating system, and the ELF malicious sample set on the Linux x86 platform is used as the original sample set. The detection rate of this sample set by ClamAV before processing is 98%, and the detection rate drops to 25% after processing. The detection rate of this sample set by 360 Security before processing is 4%, and the detection rate drops to 1% after processing. Furthermore, after processing, the average number of engines on VirusTotal that could detect the maliciousness of the samples decreases from 39 to 15. Many malicious samples were detected by $41\sim 43$ engines on VirusTotal before processing, while after the evade-detection processing, only $8\sim 9$ engines on VirusTotal can detect the malware. In terms of executability and malicious function consistency, the processed samples can still run normally and the malicious functions remain consistent with those before processing. Overall, the proposed method in this paper can effectively generate adversarial ELF malware samples. Using this method to generate malicious samples to test and train the anti-virus software can promote and improve anti-virus software's detection and defense capability against malware.
引用
收藏
页码:743 / 757
页数:15
相关论文
共 50 条
  • [11] Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems
    Cao, Yuanjiang
    Chen, Xiaocong
    Yao, Lina
    Wang, Xianzhi
    Zhang, Wei Emma
    PROCEEDINGS OF THE 43RD INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '20), 2020, : 1669 - 1672
  • [12] Simulation of Reinforcement Learning-based UAV Swarm Adversarial Strategy Deduction
    Cao Z.
    Sun Z.
    Yan G.
    Fu Y.
    Yang B.
    Li Q.
    Lei K.
    Gao L.
    Binggong Xuebao/Acta Armamentarii, 2023, 44 : 126 - 134
  • [13] Deep Reinforcement Learning-Based Adversarial Defense in Vehicular Communication Systems
    Sedar, Roshan
    Kalalas, Charalampos
    Vazquez-Gallego, Francisco
    Alonso-Zarate, Jesus
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 5250 - 5256
  • [14] Fault detection method based on adversarial reinforcement learning
    Li, Junhuai
    Wu, Yunwen
    Wang, Huaijun
    Xu, Jiang
    FRONTIERS IN COMPUTER SCIENCE, 2023, 4
  • [15] Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy
    Chen, Yu-Ying
    Chen, Chiao-Ting
    Sang, Chuan-Yun
    Yang, Yao-Chun
    Huang, Szu-Hao
    IEEE ACCESS, 2021, 9 : 50667 - 50685
  • [16] Text Adversarial Examples Generation and Defense Based on Reinforcement Learning
    Li, Yue
    Xu, Pengjian
    Ruan, Qing
    Xu, Wusheng
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2021, 28 (04): : 1306 - 1314
  • [17] RLVS: A Reinforcement Learning-Based Sparse Adversarial Attack Method for Black-Box Video Recognition
    Song, Jianxin
    Yu, Dan
    Teng, Hongfei
    Chen, Yongle
    ELECTRONICS, 2025, 14 (02):
  • [18] Reinforcement Learning-based Adversarial Attack Generation Examples in Connected and Autonomous Vehicles: A Case Study on Vehicular Platoons
    Vyas, Shashank Dhananjay
    Dey, Satadru
    IFAC PAPERSONLINE, 2024, 58 (28): : 78 - 83
  • [19] Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks
    Merzouk, Mohamed Amine
    Delas, Josephine
    Neal, Christopher
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [20] Reinforcement Learning-based Adversarial Attacks on Object Detectors using Reward Shaping
    Shi, Zhenbo
    Yang, Wei
    Xu, Zhenbo
    Yu, Zhidong
    Huang, Liusheng
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2023, 2023, : 8424 - 8432