首页> 外文会议>IEEE International Conference on Collaboration and Internet Computing >A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks
【24h】

A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks

机译:对抗对抗系统攻击的鲁棒恶意软件检测方法

获取原文

摘要

In recent years, Android has become the leading smartphone operating system across the world. However, due to their increasing popularity, Android devices have become the primary target to mobile malware. To address the arising security threats, many malware detection approaches have been studied that aim at providing strong defense mechanisms against malware. However, with more such malware detection systems being distributed and deployed, malware authors tend to generate adversarial examples by manipulating mobile applications to avoid being detected by the malware detection systems. In this paper, we investigate different types of adversarial example attacks while researching a viable approach to fight against them. More specifically, we first present the literature review on both existing malware detection approaches and adversarial example attacks against them. Then, we focus on the widely used evasion attack model that is applied to generate mutated samples. By working with various app features such as binary N-grams of API calls, we will generate feature sets consisting of a selected range of binary N-grams. As a result, we intend to use the manipulated dataset to develop and train our classifier to detect the evasion attack, and the goal of our approach is to further enhance the robustness of malware detection approach in the presence of adversarial example attacks.
机译:近年来,Android已经成为世界各地的智能手机操作系统的龙头。但是,由于他们的日益普及,Android设备已经成为首要目标移动恶意软件。为了解决出现的安全威胁,许多恶意软件检测方法进行了研究,旨在以防止恶意软件提供了强有力的防御机制。但是,随着被分发和部署的多个这样的恶意软件检测系统,恶意软件作者容易产生通过操纵移动应用,以避免由恶意软件检测系统所检测对抗性例子。在本文中,我们研究了不同类型的对抗性例如攻击,而研究一个可行的办法来打击他们。更具体地说,我们首先提出对已有的恶意软件检测方法和对他们的敌对攻击例如文献综述。然后,我们专注于应用到产生突变样本广泛使用的规避攻击模型。通过与各种应用程序的工作特性,如二进制的n-gram的API调用的,我们将产生由二进制的n-gram的选定范围的功能集。因此,我们打算用操纵数据集,开发和培养我们的分类器检测逃避攻击,我们的方法的目标是进一步提高恶意软件的检测方法的鲁棒性的对抗性例如攻击的存在。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号