skip to main content
10.1145/3410530.3414411acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
poster

DOOM: a novel adversarial-DRL-based op-code level metamorphic malware obfuscator for the enhancement of IDS

Published:12 September 2020Publication History

ABSTRACT

We designed and developed DOOM (Adversarial-DRL based Opcode level Obfuscator to generate Metamorphic malware), a novel system that uses adversarial deep reinforcement learning to obfuscate malware at the op-code level for the enhancement of IDS. The ultimate goal of DOOM is not to give a potent weapon in the hands of cyber-attackers, but to create defensive-mechanisms against advanced zero-day attacks. Experimental results indicate that the obfuscated malware created by DOOM could effectively mimic multiple-simultaneous zero-day attacks. To the best of our knowledge, DOOM is the first system that could generate obfuscated malware detailed to individual op-code level. DOOM is also the first-ever system to use efficient continuous action control based deep reinforcement learning in the area of malware generation and defense. Experimental results indicate that over 67% of the metamorphic malware generated by DOOM could easily evade detection from even the most potent IDS. This achievement gains significance, as with this, even IDS augment with advanced routing sub-system can be easily evaded by the malware generated by DOOM.

References

  1. Jean-Marie Borello and Ludovic Mé. 2008. Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology 4, 3 (2008), 211--220.Google ScholarGoogle ScholarCross RefCross Ref
  2. Priti Desai and Mark Stamp. 2010. A highly metamorphic virus generator. IJMIS 1 (2010), 402--427.Google ScholarGoogle ScholarCross RefCross Ref
  3. David Silver et. al. 2014. Deterministic Policy Gradient Algorithms. In ICML'14 - Volume 32 (ICML'14). JMLR.org, I-387--I-395.Google ScholarGoogle Scholar
  4. Timothy P. Lillicrap et. al. 2015. Continuous control with deep reinforcement learning. CoRR abs/1509.02971 (2015). arXiv:1509.02971Google ScholarGoogle Scholar
  5. Volodymyr Mnih et. al. 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 (2015), 529--533.Google ScholarGoogle Scholar
  6. Weiwei Hu and Ying Tan. 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs/1702.05983 (2017). arXiv:1702.05983Google ScholarGoogle Scholar
  7. Zilong Lin, Yong Shi, and Zhi Xue. 2018. IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection. CoRR abs/1809.02077 (2018). arXiv:1809.02077Google ScholarGoogle Scholar
  8. Antonio Nappa, M. Zubair Rafique, and Juan Caballero. 2015. The MALICIA Dataset: Identification and Analysis of Drive-by Download Operations. Int. J. Inf. Secur. 14, 1 (Feb. 2015), 15--33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hemant Rathore, Sanjay K Sahay, Palash Chaturvedi, and Mohit Sewak. 2018. Android malicious application classification using clustering. In International Conference on Intelligent Systems Design and Applications. Springer, 659--667.Google ScholarGoogle Scholar
  10. Sanjay K Sahay, Ashu Sharma, and Hemant Rathore. 2020. Evolution of Malware and Its Detection Techniques. In Information and Communication Technology for Sustainable Development. Springer, 139--150.Google ScholarGoogle Scholar
  11. John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal Policy Optimization Algorithms. CoRR abs/1707.06347 (2017).Google ScholarGoogle Scholar
  12. Mohit Sewak. 2019. Deep Reinforcement Learning: Frontiers of Artificial Intelligence (1st ed.). Springer Publishing Company, Incorporated.Google ScholarGoogle Scholar
  13. Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore. 2018. Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection. In 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. 293--296.Google ScholarGoogle Scholar
  14. Mohit Sewak, Sanjay K Sahay, and Hemant Rathore. 2020. An Overview of Deep Learning Architecture of Deep Neural Networks and Autoencoders. Journal of Computational and Theoretical Nanoscience 17, 1 (2020), 182--188.Google ScholarGoogle ScholarCross RefCross Ref
  15. Muhammad Usama, Muhammad Asim, Siddique Latif, Junaid Qadir, and Ala I. Al-Fuqaha. 2019. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. IWCMC'19 (2019), 78--83.Google ScholarGoogle Scholar
  16. M. Usama, M. Asim, S. Latif, J. Qadir, and Ala-Al-Fuqaha. 2019. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. 78--83.Google ScholarGoogle Scholar
  17. Hado van Hasselt, Arthur Guez, and David Silver. 2015. Deep Reinforcement Learning with Double Q-learning. CoRR abs/1509.06461 (2015). arXiv:1509.06461Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Wu, B. Fang, J. Wang, Q. Liu, and X. Cui. 2019. Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning. In ICC'2019. 1--6.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    UbiComp/ISWC '20 Adjunct: Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers
    September 2020
    732 pages
    ISBN:9781450380768
    DOI:10.1145/3410530

    Copyright © 2020 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 12 September 2020

    Check for updates

    Qualifiers

    • poster

    Acceptance Rates

    Overall Acceptance Rate764of2,912submissions,26%

    Upcoming Conference

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader