论文标题
强大的恶意软件分类的基于深度学习的细粒度分层学习方法
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification
论文作者
论文摘要
对家庭和工业应用的物联网(IoT)的广泛接受都伴随着一些安全问题。一个主要的安全问题是,他们可能遭受对抗恶意意图的虐待。理解和分析物联网恶意行为至关重要,尤其是在广泛应用中的快速增长和采用时。但是,最近的研究表明,基于机器学习的方法通过在二进制文件中添加垃圾代码来容易受到对抗攻击的影响,例如,打算欺骗那些机器学习或基于深度学习的检测系统。意识到应对这一挑战的重要性,这项研究提出了一个恶意软件检测系统,该系统对对抗性攻击是可靠的。为此,请检查最先进方法的性能,以使用图形嵌入和增强技术制作的对抗物联网软件。特别是,我们研究了这种方法对两种黑盒对抗方法的鲁棒性,即GEA和SGEA,以生成以下开销并保持其实用性完好无损的对抗性示例(AES)。我们对基于GEA的AE的全面实验显示了错误分类与注入样品的图形大小之间的关系。通过优化和小扰动,通过使用SGEA,所有物联网恶意软件样本都被错误地分类为良性。这突出了对抗设置下当前检测系统的脆弱性。随着可能的对抗性攻击的景观,我们提出了DL-FHMC(一种用于恶意软件检测和分类的细粒度层次学习方法),对AES具有可靠性,其能力可检测88.52%的恶意AES。
The wide acceptance of Internet of Things (IoT) for both household and industrial applications is accompanied by several security concerns. A major security concern is their probable abuse by adversaries towards their malicious intent. Understanding and analyzing IoT malicious behaviors is crucial, especially with their rapid growth and adoption in wide-range of applications. However, recent studies have shown that machine learning-based approaches are susceptible to adversarial attacks by adding junk codes to the binaries, for example, with an intention to fool those machine learning or deep learning-based detection systems. Realizing the importance of addressing this challenge, this study proposes a malware detection system that is robust to adversarial attacks. To do so, examine the performance of the state-of-the-art methods against adversarial IoT software crafted using the graph embedding and augmentation techniques. In particular, we study the robustness of such methods against two black-box adversarial methods, GEA and SGEA, to generate Adversarial Examples (AEs) with reduced overhead, and keeping their practicality intact. Our comprehensive experimentation with GEA-based AEs show the relation between misclassification and the graph size of the injected sample. Upon optimization and with small perturbation, by use of SGEA, all the IoT malware samples are misclassified as benign. This highlights the vulnerability of current detection systems under adversarial settings. With the landscape of possible adversarial attacks, we then propose DL-FHMC, a fine-grained hierarchical learning approach for malware detection and classification, that is robust to AEs with a capability to detect 88.52% of the malicious AEs.