Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 6/2023

24.12.2022 | Original Article

Android malware adversarial attacks based on feature importance prediction

verfasst von: Yanping Guo, Qiao Yan

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 6/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the last decade, malicious Android applications have increased rapidly because of the popularity of Android mobile devices. In particular, some Android malware starts to use the adversarial examples generation technology to escape from the detection system. To defend against the adversarial examples of Android malware, researchers need to research the generation of adversarial examples. Meanwhile, substitute models are one of the research topics in machine learning interpretability. In the paper, we propose a new model called p-MalGAN with a Feature Importance Prediction (FIP) module based on MalGAN, a Generative Adversarial Network (GAN) for generating malware adversarial examples. FIP module uses random forest as an substitute model to calculates the importance of features by measuring the correlation between the features and the labels of the detector to predict the features used by the detector, then uses the high-confidence features to generate adversarial examples. Compared with MalGAN, our model overcomes the difficulty of not knowing detector features in realistic scenes. Experimental results show that our method can effectively predict the features of the detector and reduces the difference between the adversarial examples and the original malware with slightly affecting the attack performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
2.
Zurück zum Zitat Naval S, Laxmi V, Rajarajan M, Gaur MS, Conti M (2015) Employing program semantics for malware detection. IEEE Trans Inf For Secur. IEEE, New York, pp 2591–2604 Naval S, Laxmi V, Rajarajan M, Gaur MS, Conti M (2015) Employing program semantics for malware detection. IEEE Trans Inf For Secur. IEEE, New York, pp 2591–2604
3.
Zurück zum Zitat Yuan Z, Lu Y, Wang Z, Xue Y (2014) Droid-sec: deep learning in android malware detection. In: Proceedings of the 2014 ACM conference on SIGCOMM. ACM, New York, pp 371–372 Yuan Z, Lu Y, Wang Z, Xue Y (2014) Droid-sec: deep learning in android malware detection. In: Proceedings of the 2014 ACM conference on SIGCOMM. ACM, New York, pp 371–372
4.
Zurück zum Zitat Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:​1312.​6199
5.
6.
Zurück zum Zitat Xiao C, Li B, Zhu JY, He W, Liu M, Song D (2018) Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610 Xiao C, Li B, Zhu JY, He W, Liu M, Song D (2018) Generating adversarial examples with adversarial networks. arXiv preprint arXiv:​1801.​02610
7.
8.
Zurück zum Zitat Li X, Kong K, Xu S, Qin P, He D (2021) Feature selection-based android malware adversarial sample generation and detection method. In: IET Information Security. pp 401–416 Li X, Kong K, Xu S, Qin P, He D (2021) Feature selection-based android malware adversarial sample generation and detection method. In: IET Information Security. pp 401–416
9.
Zurück zum Zitat Rathore H, Sahay SK, Nikam P, Sewak M (2021) Robust android malware detection system against adversarial attacks using q-learning. In: Information Systems Frontiers. pp 867–882 Rathore H, Sahay SK, Nikam P, Sewak M (2021) Robust android malware detection system against adversarial attacks using q-learning. In: Information Systems Frontiers. pp 867–882
10.
Zurück zum Zitat Rathore H, Sahay SK, Dhillon J, Sewak M (2021) Designing adversarial attack and defence for robust android malware detection models. 2021 51st annual IEEE/IFIP international conference on dependable systems and networks-supplemental volume (DSN-S). IEEE, New York, pp 29–32CrossRef Rathore H, Sahay SK, Dhillon J, Sewak M (2021) Designing adversarial attack and defence for robust android malware detection models. 2021 51st annual IEEE/IFIP international conference on dependable systems and networks-supplemental volume (DSN-S). IEEE, New York, pp 29–32CrossRef
11.
Zurück zum Zitat Rathore H, Sahay SK, Sewak M (2021) Are android malware detection models adversarially robust? Poster Abstract. In: Proceedings of the 20th international conference on information processing in sensor networks (co-located with CPS-IoT Week 2021). ACM, New York, pp 408–409 Rathore H, Sahay SK, Sewak M (2021) Are android malware detection models adversarially robust? Poster Abstract. In: Proceedings of the 20th international conference on information processing in sensor networks (co-located with CPS-IoT Week 2021). ACM, New York, pp 408–409
12.
Zurück zum Zitat Li H, Zhou S, Yuan W, Li J, Leung H (2019) Adversarial-example attacks toward android malware detection system. IEEE Syst J 14(1):653–656CrossRef Li H, Zhou S, Yuan W, Li J, Leung H (2019) Adversarial-example attacks toward android malware detection system. IEEE Syst J 14(1):653–656CrossRef
13.
Zurück zum Zitat Kawai M, Ota K, Dong M (2019) Improved malgan: avoiding malware detector by leaning cleanware features. 2019 international conference on artificial intelligence in information and communication (ICAIIC). IEEE, New York, pp 040–045CrossRef Kawai M, Ota K, Dong M (2019) Improved malgan: avoiding malware detector by leaning cleanware features. 2019 international conference on artificial intelligence in information and communication (ICAIIC). IEEE, New York, pp 040–045CrossRef
14.
Zurück zum Zitat Melis M, Scalas M, Demontis A, Maiorca D, Biggio B, Giacinto G, Roli F (2022) Do gradient-based explanations tell anything about adversarial robustness to android malware? Int J Mach Learn Cybern. Springer, Berlin, pp 217–232 Melis M, Scalas M, Demontis A, Maiorca D, Biggio B, Giacinto G, Roli F (2022) Do gradient-based explanations tell anything about adversarial robustness to android malware? Int J Mach Learn Cybern. Springer, Berlin, pp 217–232
15.
Zurück zum Zitat Enck W, Octeau D, McDaniel PD, Chaudhuri S (2011) A study of android application security. In: USENIX security symposium. pp 2–2 Enck W, Octeau D, McDaniel PD, Chaudhuri S (2011) A study of android application security. In: USENIX security symposium. pp 2–2
16.
Zurück zum Zitat Kovacheva A (2013) Efficient code obfuscation for Android. International conference on advances in information technology. Springer, Berlin, pp 104–119CrossRef Kovacheva A (2013) Efficient code obfuscation for Android. International conference on advances in information technology. Springer, Berlin, pp 104–119CrossRef
17.
Zurück zum Zitat Graux P, Lalande JF, Tong VVT (2019) Obfuscated android application development. In: Proceedings of the third central european cybersecurity conference. ACM, New York, pp 1–6 Graux P, Lalande JF, Tong VVT (2019) Obfuscated android application development. In: Proceedings of the third central european cybersecurity conference. ACM, New York, pp 1–6
18.
Zurück zum Zitat Bacci A, Bartoli A, Martinelli F, Medvet E, Mercaldo F, Visaggio CA (2018) Impact of code obfuscation on android malware detection based on static and dynamic analysis. In: International conference on information systems security and privacy. pp 379–385 Bacci A, Bartoli A, Martinelli F, Medvet E, Mercaldo F, Visaggio CA (2018) Impact of code obfuscation on android malware detection based on static and dynamic analysis. In: International conference on information systems security and privacy. pp 379–385
19.
Zurück zum Zitat Wu DJ, Mao CH, Wei TE, Lee HM, Wu KP (2012) Droidmat: Android malware detection through manifest and api calls tracing. 2012 seventh Asia joint conference on information security. IEEE, New York, pp 62–69CrossRef Wu DJ, Mao CH, Wei TE, Lee HM, Wu KP (2012) Droidmat: Android malware detection through manifest and api calls tracing. 2012 seventh Asia joint conference on information security. IEEE, New York, pp 62–69CrossRef
20.
Zurück zum Zitat Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Bengio Y (2020) Generative adversarial networks. Communications of the ACM. ACM, New York, pp 139–144 Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Bengio Y (2020) Generative adversarial networks. Communications of the ACM. ACM, New York, pp 139–144
21.
Zurück zum Zitat Hu W, Tan Y (2018) Black-box attacks against RNN based malware detection algorithms. In: LWorkshops at the thirty-second AAAI conference on artificial intelligence. AAAI, California, pp 245–251 Hu W, Tan Y (2018) Black-box attacks against RNN based malware detection algorithms. In: LWorkshops at the thirty-second AAAI conference on artificial intelligence. AAAI, California, pp 245–251
22.
Zurück zum Zitat Chen B, Ren Z, Yu C et al (2019) Adversarial examples for cnn-based malware detectors. IEEE Access. IEEE, New York, pp 54360–54371 Chen B, Ren Z, Yu C et al (2019) Adversarial examples for cnn-based malware detectors. IEEE Access. IEEE, New York, pp 54360–54371
23.
Zurück zum Zitat Peng X, Xian H, Lu Q et al (2020) Examples generating adversarial malware, with API semantics-awareness for black-box attacks. In: International symposium on security and privacy in social networks and big data. Springer, Singapore, pp 52–61 Peng X, Xian H, Lu Q et al (2020) Examples generating adversarial malware, with API semantics-awareness for black-box attacks. In: International symposium on security and privacy in social networks and big data. Springer, Singapore, pp 52–61
24.
Zurück zum Zitat Peng X, Xian H, Lu Q, Lu X (2021) Semantics aware adversarial malware examples generation for black-box attacks. Appl Soft Comput 109:107506CrossRef Peng X, Xian H, Lu Q, Lu X (2021) Semantics aware adversarial malware examples generation for black-box attacks. Appl Soft Comput 109:107506CrossRef
25.
Zurück zum Zitat Wang J, Chang X, Wang Y et al (2021) LSGAN-AT: enhancing malware detector robustness against adversarial examples. Cybersecurity, pp 1–15 Wang J, Chang X, Wang Y et al (2021) LSGAN-AT: enhancing malware detector robustness against adversarial examples. Cybersecurity, pp 1–15
26.
Zurück zum Zitat Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Duchesnay E (2011) Scikit-learn: Machine learning in python. J Mach Learn Res 12:2825–2830 Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Duchesnay E (2011) Scikit-learn: Machine learning in python. J Mach Learn Res 12:2825–2830
28.
Zurück zum Zitat Esmeir S, Markovitch S (2007) Occam’s Razor Just Got Sharper. IJCAI. AAAI, California, pp 768–773 Esmeir S, Markovitch S (2007) Occam’s Razor Just Got Sharper. IJCAI. AAAI, California, pp 768–773
29.
Zurück zum Zitat Papernot N, McDaniel P, Goodfellow I et al (2017) Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security. ACM, New York, pp 506–519 Papernot N, McDaniel P, Goodfellow I et al (2017) Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security. ACM, New York, pp 506–519
30.
Zurück zum Zitat Cui W, Li X, Huang J, Wang W, Wang S, Chen J (2020) Substitute model generation for black-box adversarial attack based on knowledge distillation. In: 2020 IEEE international conference on image processing (ICIP). IEEE, New York, pp 648–652 Cui W, Li X, Huang J, Wang W, Wang S, Chen J (2020) Substitute model generation for black-box adversarial attack based on knowledge distillation. In: 2020 IEEE international conference on image processing (ICIP). IEEE, New York, pp 648–652
31.
Zurück zum Zitat Aldahdooh A, Hamidouche W, Fezza SA, Déforges O (2022) Adversarial example detection for DNN models: a review and experimental comparison. In: Artificial Intelligence Review. Springer, Berlin, pp 1–60 Aldahdooh A, Hamidouche W, Fezza SA, Déforges O (2022) Adversarial example detection for DNN models: a review and experimental comparison. In: Artificial Intelligence Review. Springer, Berlin, pp 1–60
32.
Zurück zum Zitat Ali A, Gravino C (2022) Evaluating the impact of feature selection consistency in software prediction. Science of Computer Programming, 213, 102715 Ali A, Gravino C (2022) Evaluating the impact of feature selection consistency in software prediction. Science of Computer Programming, 213, 102715
34.
Zurück zum Zitat Taheri L, Kadir AFA, Lashkari AH (2019) Extensible android malware detection and family classification using network-flows and API-calls. 2019 international Carnahan conference on security technology (ICCST). IEEE, New York, pp 1–8 Taheri L, Kadir AFA, Lashkari AH (2019) Extensible android malware detection and family classification using network-flows and API-calls. 2019 international Carnahan conference on security technology (ICCST). IEEE, New York, pp 1–8
35.
Zurück zum Zitat Wang H, Si J, Li H, Guo Y (2019) Rmvdroid: Towards a reliable android malware dataset with app metadata. 2019 IEEE/ACM 16th international conference on mining software repositories (MSR). IEEE, New York, pp 404–408CrossRef Wang H, Si J, Li H, Guo Y (2019) Rmvdroid: Towards a reliable android malware dataset with app metadata. 2019 IEEE/ACM 16th international conference on mining software repositories (MSR). IEEE, New York, pp 404–408CrossRef
Metadaten
Titel
Android malware adversarial attacks based on feature importance prediction
verfasst von
Yanping Guo
Qiao Yan
Publikationsdatum
24.12.2022
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 6/2023
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-022-01747-9

Weitere Artikel der Ausgabe 6/2023

International Journal of Machine Learning and Cybernetics 6/2023 Zur Ausgabe