...
首页> 外文期刊>Cybersecurity >DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection
【24h】

DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection

机译:DeepMal:恶意保存对抗静态恶意软件检测的对抗性指导

获取原文
   

获取外文期刊封面封底 >>

       

摘要

Outside the explosive successful applications of deep learning (DL) in natural language processing, computer vision, and information retrieval, there have been numerous Deep Neural Networks (DNNs) based alternatives for common security-related scenarios with malware detection among more popular. Recently, adversarial learning has gained much focus. However, unlike computer vision applications, malware adversarial attack is expected to guarantee malwares’ original maliciousness semantics. This paper proposes a novel adversarial instruction learning technique, DeepMal, based on an adversarial instruction learning approach for static malware detection. So far as we know, DeepMal is the first practical and systematical adversarial learning method, which could directly produce adversarial samples and effectively bypass static malware detectors powered by DL and machine learning (ML) models while preserving attack functionality in the real world. Moreover, our method conducts small-scale attacks, which could evade typical malware variants analysis (e.g., duplication check). We evaluate DeepMal on two real-world datasets, six typical DL models, and three typical ML models. Experimental results demonstrate that, on both datasets, DeepMal can attack typical malware detectors with the mean F1-score and F1-score decreasing maximal 93.94% and 82.86% respectively. Besides, three typical types of malware samples (Trojan horses, Backdoors, Ransomware) prove to preserve original attack functionality, and the mean duplication check ratio of malware adversarial samples is below 2.0%. Besides, DeepMal can evade dynamic detectors and be easily enhanced by learning more dynamic features with specific constraints.
机译:在深度学习(DL)的爆炸性成功应用之外,在自然语言处理,计算机愿景和信息检索中,已经存在许多深度神经网络(DNNS)基于常见的安全相关场景的替代方案,具有恶意软件检测在更受欢迎中。最近,对抗学习获得了很多焦点。但是,与计算机视觉应用程序不同,预计恶意软件对抗攻击将保证恶意的原始恶臭语义。本文提出了一种基于静态恶意软件检测的普发性指导学习方法的新型对抗性教学学习技术。据我们所知,DeepMal是第一种实用和系统的对抗性学习方法,它可以直接产生对抗性样本并有效地绕过由DL和机器学习(ML)模型的静态恶意软件探测器,同时保留现实世界中的攻击功能。此外,我们的方法进行了小规模的攻击,这可能逃避典型的恶意软件变体分析(例如,复制检查)。我们在两个现实世界数据集,六种典型的DL模型和三个典型的ML型号上进行评估。实验结果表明,在两个数据集上,DeepMal可以分别攻击典型的恶意软件探测器,平均值和F1分数分别降低最大93.94%和82.86%。此外,三种典型类型的恶意软件样本(特洛伊木马,后门,赎金软件)证明了保持原始攻击功能,恶意软件对抗性样本的平均重复检查率低于2.0%。此外,DeepMal可以避免动态探测器,并通过学习具有特定约束的更具动态功能来易于增强。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号