A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method

被引:0
|
作者
Xue, Mingfu [1 ]
Fu, Jinlong [2 ]
Li, Zhiyuan [2 ]
Ni, Shifeng [2 ]
Wu, Heyi [3 ]
Zhang, Leo Yu [4 ]
Zhang, Yushu [2 ]
Liu, Weiqiang [5 ]
机构
[1] East China Normal Univ, Sch Commun & Elect Engn, Shanghai 200241, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[3] Sangfor Technol Inc, Shenzhen 215000, Peoples R China
[4] Griffith Univ, Sch Informat & Commun Technol, Southport, Qld 4215, Australia
[5] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Ground penetrating radar; Geophysical measurement techniques; Computer viruses; Operating systems; Software; Feature extraction; Linux; Engines; Viruses (medical); Reinforcement learning; Computer virus; ITAI system; ELF; reinforcement learning; adversarial malicious samples;
D O I
10.1109/JETCAS.2024.3481273
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, domestic Linux operating systems have developed rapidly, but the threat of ELF viruses has become increasingly prominent. Currently, domestic antivirus software for information technology application innovation (ITAI) operating systems shows insufficient capability in detecting ELF viruses. At the same time, research on generating malicious samples in ELF format is scarce. In order to fill this gap at home and abroad and meet the growing application needs of domestic antivirus software companies, this paper proposes an automatic ELF adversarial malicious samples generation technique based on reinforcement learning. Based on reinforcement learning framework, after being processed by cycles of feature extraction, malicious detection, agent decision-making, and evade-detection operation, the sample can evade the detection of antivirus engines. Specifically, nine feature extractor subclasses are used to extract features in multiple aspects. The PPO algorithm is used as the agent algorithm. The action table in the evade-detection module contains 11 evade-detection operations for ELF malicious samples. This method is experimentally verified on the ITAI operating system, and the ELF malicious sample set on the Linux x86 platform is used as the original sample set. The detection rate of this sample set by ClamAV before processing is 98%, and the detection rate drops to 25% after processing. The detection rate of this sample set by 360 Security before processing is 4%, and the detection rate drops to 1% after processing. Furthermore, after processing, the average number of engines on VirusTotal that could detect the maliciousness of the samples decreases from 39 to 15. Many malicious samples were detected by $41\sim 43$ engines on VirusTotal before processing, while after the evade-detection processing, only $8\sim 9$ engines on VirusTotal can detect the malware. In terms of executability and malicious function consistency, the processed samples can still run normally and the malicious functions remain consistent with those before processing. Overall, the proposed method in this paper can effectively generate adversarial ELF malware samples. Using this method to generate malicious samples to test and train the anti-virus software can promote and improve anti-virus software's detection and defense capability against malware.
引用
收藏
页码:743 / 757
页数:15
相关论文
共 50 条
  • [21] Reinforcement learning-based secure training for adversarial defense in graph neural networks
    An, Dongdong
    Yang, Yi
    Gao, Xin
    Qi, Hongda
    Yang, Yang
    Ye, Xin
    Li, Maozhen
    Zhao, Qin
    NEUROCOMPUTING, 2025, 630
  • [22] Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems
    Kim, Mun-Suk
    MATHEMATICS, 2024, 12 (24)
  • [23] Adversarial Reinforcement Learning for Procedural Content Generation
    Gisslen, Linus
    Eakins, Andy
    Gordillo, Camilo
    Bergdahl, Joakim
    Tollmar, Konrad
    2021 IEEE CONFERENCE ON GAMES (COG), 2021, : 9 - 16
  • [24] A novel reinforcement learning-based method for structure optimization
    Mei, Zijian
    Yang, Zhouwang
    Chen, Jingrun
    ENGINEERING OPTIMIZATION, 2024,
  • [25] A Reinforcement Learning-based Sequence Generation Algorithm for Password Guessing
    Chen, Zheng
    Zhang, Xuliang
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4891 - 4896
  • [26] DEEP REINFORCEMENT LEARNING-BASED AUTOMATIC TEST PATTERN GENERATION
    Li, Wenxing
    Lyu, Hongqin
    Liang, Shengwen
    Liu, Zizhen
    Lin, Ning
    Wang, Zhongrui
    Tian, Pengyu
    Wang, Tiancheng
    Li, Huawei
    CONFERENCE OF SCIENCE & TECHNOLOGY FOR INTEGRATED CIRCUITS, 2024 CSTIC, 2024,
  • [27] A Reinforcement Learning-based Framework for the Generation and Evolution of Adaptation Rules
    Zhao, Tianqi
    Zhang, Wei
    Zhao, Haiyan
    Jin, Zhi
    2017 IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC COMPUTING (ICAC), 2017, : 103 - 112
  • [28] Adversarial learning-based image generation algorithm for AI art creation
    Chen, Zhou
    Xia, Zaixi
    International Journal of Information and Communication Technology, 2025, 26 (04) : 57 - 71
  • [29] Offense and defence against adversarial sample: A reinforcement learning method in energy trading market
    Li, Donghe
    Yang, Qingyu
    Ma, Linyue
    Peng, Zhenhua
    Liao, Xiao
    FRONTIERS IN ENERGY RESEARCH, 2023, 10
  • [30] A Speech Adversarial Sample Detection Method Based on Manifold Learning
    Ma, Xiao
    Xu, Dongliang
    Yang, Chenglin
    Li, Panpan
    Li, Dong
    MATHEMATICS, 2024, 12 (08)