A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method

被引:0
|
作者
Xue, Mingfu [1 ]
Fu, Jinlong [2 ]
Li, Zhiyuan [2 ]
Ni, Shifeng [2 ]
Wu, Heyi [3 ]
Zhang, Leo Yu [4 ]
Zhang, Yushu [2 ]
Liu, Weiqiang [5 ]
机构
[1] East China Normal Univ, Sch Commun & Elect Engn, Shanghai 200241, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[3] Sangfor Technol Inc, Shenzhen 215000, Peoples R China
[4] Griffith Univ, Sch Informat & Commun Technol, Southport, Qld 4215, Australia
[5] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Ground penetrating radar; Geophysical measurement techniques; Computer viruses; Operating systems; Software; Feature extraction; Linux; Engines; Viruses (medical); Reinforcement learning; Computer virus; ITAI system; ELF; reinforcement learning; adversarial malicious samples;
D O I
10.1109/JETCAS.2024.3481273
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, domestic Linux operating systems have developed rapidly, but the threat of ELF viruses has become increasingly prominent. Currently, domestic antivirus software for information technology application innovation (ITAI) operating systems shows insufficient capability in detecting ELF viruses. At the same time, research on generating malicious samples in ELF format is scarce. In order to fill this gap at home and abroad and meet the growing application needs of domestic antivirus software companies, this paper proposes an automatic ELF adversarial malicious samples generation technique based on reinforcement learning. Based on reinforcement learning framework, after being processed by cycles of feature extraction, malicious detection, agent decision-making, and evade-detection operation, the sample can evade the detection of antivirus engines. Specifically, nine feature extractor subclasses are used to extract features in multiple aspects. The PPO algorithm is used as the agent algorithm. The action table in the evade-detection module contains 11 evade-detection operations for ELF malicious samples. This method is experimentally verified on the ITAI operating system, and the ELF malicious sample set on the Linux x86 platform is used as the original sample set. The detection rate of this sample set by ClamAV before processing is 98%, and the detection rate drops to 25% after processing. The detection rate of this sample set by 360 Security before processing is 4%, and the detection rate drops to 1% after processing. Furthermore, after processing, the average number of engines on VirusTotal that could detect the maliciousness of the samples decreases from 39 to 15. Many malicious samples were detected by $41\sim 43$ engines on VirusTotal before processing, while after the evade-detection processing, only $8\sim 9$ engines on VirusTotal can detect the malware. In terms of executability and malicious function consistency, the processed samples can still run normally and the malicious functions remain consistent with those before processing. Overall, the proposed method in this paper can effectively generate adversarial ELF malware samples. Using this method to generate malicious samples to test and train the anti-virus software can promote and improve anti-virus software's detection and defense capability against malware.
引用
收藏
页码:743 / 757
页数:15
相关论文
共 50 条
  • [41] Critical Sample Generation Method for Static Voltage Stability Based on Transfer Learning and Wasserstein Generative Adversarial Network
    Liao Y.
    Wu Z.
    Dianwang Jishu/Power System Technology, 2021, 45 (09): : 3722 - 3728
  • [42] Adversarial sample generation algorithm for vertical federated learning
    Chen, Xiaolin
    Zan, Daoguang
    Wu, Bingchao
    Guan, Bei
    Wang, Yongji
    Tongxin Xuebao/Journal on Communications, 2023, 44 (08): : 1 - 13
  • [43] Efficient adversarial attacks detection for deep reinforcement learning-based autonomous planetary landing GNC
    Wang, Ziwei
    Aouf, Nabil
    ACTA ASTRONAUTICA, 2024, 224 : 37 - 47
  • [44] Adversarial Attacks on Deep Reinforcement Learning-based Traffic Signal Control Systems with Colluding Vehicles
    Qu, Ao
    Tang, Yihong
    Ma, Wei
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (06)
  • [45] A Reinforcement Learning-Based Adaptive Learning System
    Shawky, Doaa
    Badawi, Ashraf
    INTERNATIONAL CONFERENCE ON ADVANCED MACHINE LEARNING TECHNOLOGIES AND APPLICATIONS (AMLTA2018), 2018, 723 : 221 - 231
  • [46] A model-based reinforcement learning method based on conditional generative adversarial networks
    Zhao, Tingting
    Wang, Ying
    Li, Guixi
    Kong, Le
    Chen, Yarui
    Wang, Yuan
    Xie, Ning
    Yang, Jucheng
    PATTERN RECOGNITION LETTERS, 2021, 152 : 18 - 25
  • [47] Machine Learning-Based Malicious Application Detection of Android
    Wei, Linfeng
    Luo, Weiqi
    Weng, Jian
    Zhong, Yanjun
    zhang, Xiaoqian
    Yan, Zheng
    IEEE ACCESS, 2017, 5 : 25591 - 25601
  • [48] Adversarial Sample Generation Method Based on Global Convolution Noise Reduction Model
    Automatic Control and Computer Sciences, 2023, 57 : 389 - 399
  • [49] Virtual sample generation method based on generative adversarial fuzzy neural network
    Cui, Canlin
    Tang, Jian
    Xia, Heng
    Qiao, Junfei
    Yu, Wen
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (09): : 6979 - 7001
  • [50] Virtual sample generation method based on generative adversarial fuzzy neural network
    Canlin Cui
    Jian Tang
    Heng Xia
    Junfei Qiao
    Wen Yu
    Neural Computing and Applications, 2023, 35 : 6979 - 7001