A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method

被引:0
|
作者
Xue, Mingfu [1 ]
Fu, Jinlong [2 ]
Li, Zhiyuan [2 ]
Ni, Shifeng [2 ]
Wu, Heyi [3 ]
Zhang, Leo Yu [4 ]
Zhang, Yushu [2 ]
Liu, Weiqiang [5 ]
机构
[1] East China Normal Univ, Sch Commun & Elect Engn, Shanghai 200241, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[3] Sangfor Technol Inc, Shenzhen 215000, Peoples R China
[4] Griffith Univ, Sch Informat & Commun Technol, Southport, Qld 4215, Australia
[5] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Ground penetrating radar; Geophysical measurement techniques; Computer viruses; Operating systems; Software; Feature extraction; Linux; Engines; Viruses (medical); Reinforcement learning; Computer virus; ITAI system; ELF; reinforcement learning; adversarial malicious samples;
D O I
10.1109/JETCAS.2024.3481273
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, domestic Linux operating systems have developed rapidly, but the threat of ELF viruses has become increasingly prominent. Currently, domestic antivirus software for information technology application innovation (ITAI) operating systems shows insufficient capability in detecting ELF viruses. At the same time, research on generating malicious samples in ELF format is scarce. In order to fill this gap at home and abroad and meet the growing application needs of domestic antivirus software companies, this paper proposes an automatic ELF adversarial malicious samples generation technique based on reinforcement learning. Based on reinforcement learning framework, after being processed by cycles of feature extraction, malicious detection, agent decision-making, and evade-detection operation, the sample can evade the detection of antivirus engines. Specifically, nine feature extractor subclasses are used to extract features in multiple aspects. The PPO algorithm is used as the agent algorithm. The action table in the evade-detection module contains 11 evade-detection operations for ELF malicious samples. This method is experimentally verified on the ITAI operating system, and the ELF malicious sample set on the Linux x86 platform is used as the original sample set. The detection rate of this sample set by ClamAV before processing is 98%, and the detection rate drops to 25% after processing. The detection rate of this sample set by 360 Security before processing is 4%, and the detection rate drops to 1% after processing. Furthermore, after processing, the average number of engines on VirusTotal that could detect the maliciousness of the samples decreases from 39 to 15. Many malicious samples were detected by $41\sim 43$ engines on VirusTotal before processing, while after the evade-detection processing, only $8\sim 9$ engines on VirusTotal can detect the malware. In terms of executability and malicious function consistency, the processed samples can still run normally and the malicious functions remain consistent with those before processing. Overall, the proposed method in this paper can effectively generate adversarial ELF malware samples. Using this method to generate malicious samples to test and train the anti-virus software can promote and improve anti-virus software's detection and defense capability against malware.
引用
收藏
页码:743 / 757
页数:15
相关论文
共 50 条
  • [31] A Reinforcement Learning-Based Control Approach for Unknown Nonlinear Systems with Persistent Adversarial Inputs
    Zhong, Xiangnan
    He, Haibo
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [32] Improving Generalization in Reinforcement Learning-Based Trading by Using a Generative Adversarial Market Model
    Kuo, Chia-Hsuan
    Chen, Chiao-Ting
    Lin, Sin-Jing
    Huang, Szu-Hao
    IEEE ACCESS, 2021, 9 : 50738 - 50754
  • [33] Adversarial Reinforcement Learning-based Robust Access Point Coordination Against Uncoordinated Interference
    Kihira, Yuto
    Koda, Yusuke
    Yamamoto, Koji
    Nishio, Takayuki
    Morikura, Masahiro
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [34] Enhancing reinforcement learning based adversarial malware generation to evade static detection
    Zhan, Dazhi
    Zhang, Yanyan
    Zhu, Ling
    Chen, Jun
    Xia, Shiming
    Guo, Shize
    Pan, Zhisong
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 98 : 32 - 43
  • [35] A Reliability Quantification Method for Deep Reinforcement Learning-Based Control
    Yoshioka, Hitoshi
    Hashimoto, Hirotada
    ALGORITHMS, 2024, 17 (07)
  • [36] Reinforcement Learning-Based Placement Method for Printed Circuit Board
    Chen, Zhengying
    Jia, Bowen
    Xu, Ning
    Zhao, Ning
    2024 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, ICCCAS 2024, 2024, : 13 - 17
  • [37] Deep Reinforcement Learning-Based Method of Mobile Data Offloading
    Mochizuki, Daisuke
    Abiko, Yu
    Mineno, Hiroshi
    Saito, Takato
    Ikeda, Daizo
    Katagiri, Masaji
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORK (ICMU 2018), 2018,
  • [38] Reinforcement learning-based calibration method for cameras with large FOV
    Ou, Qiaofeng
    Xie, Qunqun
    Chen, Fuhan
    Peng, Jianhao
    Xiong, Bangshu
    MEASUREMENT, 2022, 202
  • [39] Learning-Based Secret Key Generation in Relay Channels Under Adversarial Attacks
    Letafati, Mehdi
    Behroozi, Hamid
    Khalaj, Babak Hossein
    Jorswieck, Eduard A.
    IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, 2023, 4 : 749 - 764
  • [40] Myocarditis Diagnosis: A Method using Mutual Learning-Based ABC and Reinforcement Learning
    Danaei, Saba
    Bostani, Arsam
    Moravvej, Seyed Vahid
    Mohammadi, Fardin
    Alizadehsani, Roohallah
    Shoeibi, Afshin
    Alinejad-Rokny, Hamid
    Nahavandi, Saeid
    2022 IEEE 22ND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS AND 8TH IEEE INTERNATIONAL CONFERENCE ON RECENT ACHIEVEMENTS IN MECHATRONICS, AUTOMATION, COMPUTER SCIENCE AND ROBOTICS (CINTI-MACRO), 2022, : 265 - 270