首页> 外文会议>International Symposium on Cyber Security Cryptography and Machine Learning >Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features
【24h】

Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features

机译:对手罢工:使用动态API调用作为功能对抗恶意软件分类器的对抗攻击

获取原文

摘要

Malware designers have become increasingly sophisticated over time, crafting polymorphic and metamorphic malware employing obfuscation tricks such as packing and encryption to evade signature-based malware detection systems. Therefore, security professionals use machine learning-based systems to toughen their defenses - based on malware's dynamic behavioral features. However, these systems are sus-ceptible to adversarial inputs. Some malware designers exploit this vul-nerability to bypass detection. In this work, we develop two approaches to evade machine learning-based classifiers. First, we create a Genera-tive Adversarial Networks (GAN) based method, which we call 'Malware Evasion using GAN' (MEGAN) and the extended version 'Malware Eva-sion using GAN with Reduced Perturbation (MEGAN-RP).' Second, we develop a novel reinforcement learning-based approach called 'Malware Evasion using Reinforcement Agent (MERA).' We generate adversarial malware that simultaneously minimizes the recall of a target classifier and the amount of perturbation needed in the actual malware to evade detection. We evaluate our work against 13 different BlackBox detec-tion models - all of which use dynamic presence-absence of API calls as features. We observe that our approaches reduce the recall of almost all BlackBox models to zero. Further, MERA outperforms all the other models and reduces True Positive Rate (TPR) to zero against all tar-get models except the Decision Tree (DT) - with minimum perturbation in 6 out of 13 target models. We also present experimental results on adversarial retraining defense and its evasion for GAN based strategies.
机译:恶意软件设计人员随着时间的推移越来越复杂,制作多态和变质恶意软件,采用混淆技巧,例如包装和加密,以逃避基于签名的恶意软件检测系统。因此,安全专业人员使用基于机器学习的系统来强化他们的防御 - 基于恶意软件的动态行为特征。然而,这些系统是对抗性投入的可染色。一些恶意软件设计人员利用此漏洞无法绕过检测。在这项工作中,我们开发了两种方法来逃避基于机器学习的分类器。首先,我们创建了一种基于完全的对抗网络(GaN)的方法,我们使用GaN调用“使用GaN'(Megan)和扩展版本的恶意软件Eva-Sion来调用”恶意软件逃避“,使用GaN减少扰动(Megan-RP)。其次,我们开发了一种新颖的加强学习的方法,称为“使用加固代理人(MERA)”。我们生成对抗性恶意软件,同时最小化目标分类器的召回和实际恶意软件所需的扰动量以逃避检测。我们评估我们对13个不同的BlackBox扣除模型的工作 - 所有这些都使用API​​调用的动态存在缺失作为功能。我们观察到我们的方法将几乎所有黑箱模型的召回减少到零。此外,MERA优于所有其他模型,并将真正的阳性率(TPR)降低到除决策树(DT)之外的所有TAR-GET模型中 - 在13个目标模型中的6个中最小扰动。我们还提出了对普发的逆转防御和基于GaN的策略的实验结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号