Skip to main content
Erschienen in: Information Systems Frontiers 4/2021

15.11.2020

Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning

verfasst von: Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak

Erschienen in: Information Systems Frontiers | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Since the inception of Andoroid OS, smartphones sales have been growing exponentially, and today it enjoys the monopoly in the smartphone marketplace. The widespread adoption of Android smartphones has drawn the attention of malware designers, which threatens the Android ecosystem. The current state-of-the-art Android malware detection systems are based on machine learning and deep learning models. Despite having superior performance, these models are susceptible to adversarial attack. Therefore in this paper, we developed eight Android malware detection models based on machine learning and deep neural network and investigated their robustness against the adversarial attacks. For the purpose, we created new variants of malware using Reinforcement Learning, which will be misclassified as benign by the existing Android malware detection models. We propose two novel attack strategies, namely single policy attack and multiple policy attack using reinforcement learning for white-box and grey-box scenario respectively. Putting ourselves in adversary’ shoes, we designed adversarial attacks on the detection models with the goal of maximising fooling rate, while making minimum modifications to the Android application and ensuring that the app’s functionality and behaviour does not change. We achieved an average fooling rate of 44.21% and 53.20% across all the eight detection models with maximum five modifications using a single policy attack and multiple policy attack, respectively. The highest fooling rate of 86.09% with five changes was attained against the decision tree based model using the multiple policy approach. Finally, we propose an adversarial defence strategy which reduces the average fooling rate by threefold to 15.22% against a single policy attack, thereby increasing the robustness of the detection models i.e. the proposed model can effectively detect variants (metamorphic) of malware. The experimental analysis shows that our proposed Android malware detection system using reinforcement learning is more robust against adversarial attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Appice, A., Andresini, G., & Malerba, D. (2020). Clustering-aided multi-view classification: a case study on android malware detection. Journal of Intelligent Information Systems, 1–26. Appice, A., Andresini, G., & Malerba, D. (2020). Clustering-aided multi-view classification: a case study on android malware detection. Journal of Intelligent Information Systems, 1–26.
Zurück zum Zitat Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., & Siemens, C. (2014). Drebin: effective and explainable detection of android malware in your pocket. In Ndss, (Vol. 14 pp. 23–26). Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., & Siemens, C. (2014). Drebin: effective and explainable detection of android malware in your pocket. In Ndss, (Vol. 14 pp. 23–26).
Zurück zum Zitat Arshad, S., Shah, M. A., Wahid, A., Mehmood, A., Song, H., & Yu, H. (2018). Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access, 6, 4321–4339.CrossRef Arshad, S., Shah, M. A., Wahid, A., Mehmood, A., Song, H., & Yu, H. (2018). Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access, 6, 4321–4339.CrossRef
Zurück zum Zitat Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., Giacinto, G., & Roli, F. (2013). Evasion attacks against machine learning at test time. In Joint european conference on machine learning and knowledge discovery in databases. Springer (pp. 387–402). Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., Giacinto, G., & Roli, F. (2013). Evasion attacks against machine learning at test time. In Joint european conference on machine learning and knowledge discovery in databases. Springer (pp. 387–402).
Zurück zum Zitat Chinavle, D., Kolari, P., Oates, T., & Finin, T. (2009). Ensembles in adversarial classification for spam. In Proceedings of the 18th ACM conference on information and knowledge management (pp. 2015–2018). Chinavle, D., Kolari, P., Oates, T., & Finin, T. (2009). Ensembles in adversarial classification for spam. In Proceedings of the 18th ACM conference on information and knowledge management (pp. 2015–2018).
Zurück zum Zitat Dash, S. K., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., & Cavallaro, L. (2016). Droidscribe: classifying android malware based on runtime behavior. In 2016 IEEE Security and privacy workshops (SPW). IEEE (pp. 252–261). Dash, S. K., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., & Cavallaro, L. (2016). Droidscribe: classifying android malware based on runtime behavior. In 2016 IEEE Security and privacy workshops (SPW). IEEE (pp. 252–261).
Zurück zum Zitat Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M., & Rajarajan, M. (2014). Android security: a survey of issues, malware penetration, and defenses. IEEE Communications Surveys & Tutorials, 17(2), 998–1022.CrossRef Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M., & Rajarajan, M. (2014). Android security: a survey of issues, malware penetration, and defenses. IEEE Communications Surveys & Tutorials, 17(2), 998–1022.CrossRef
Zurück zum Zitat Fonteneau, R., Murphy, S. A., Wehenkel, L., & Ernst, D. (2010). Towards min max generalization in reinforcement learning. In International conference on agents and artificial intelligence. Springer (pp. 61–77). Fonteneau, R., Murphy, S. A., Wehenkel, L., & Ernst, D. (2010). Towards min max generalization in reinforcement learning. In International conference on agents and artificial intelligence. Springer (pp. 61–77).
Zurück zum Zitat Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv:1412.6572. Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv:1412.​6572.
Zurück zum Zitat Ji, Y., Bowman, B., & Huang, H. H. (2019). Securing malware cognitive systems against adversarial attacks. In 2019 IEEE international conference on cognitive computing (ICCC). IEEE (pp. 1–9). Ji, Y., Bowman, B., & Huang, H. H. (2019). Securing malware cognitive systems against adversarial attacks. In 2019 IEEE international conference on cognitive computing (ICCC). IEEE (pp. 1–9).
Zurück zum Zitat Kaelbling, L. P., Littman, M. L., & Moore, A. W. (1996). Reinforcement learning: a survey. Journal of Artificial Intelligence Research, 4, 237–285.CrossRef Kaelbling, L. P., Littman, M. L., & Moore, A. W. (1996). Reinforcement learning: a survey. Journal of Artificial Intelligence Research, 4, 237–285.CrossRef
Zurück zum Zitat Kurakin, A., Goodfellow, I., & Bengio, S. (2016). Adversarial machine learning at scale. arXiv:1611.01236. Kurakin, A., Goodfellow, I., & Bengio, S. (2016). Adversarial machine learning at scale. arXiv:1611.​01236.
Zurück zum Zitat Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Van Der Veen, V., & Platzer, C. (2014). Andrubis–1,000,000 apps later: a view on current android malware behaviors. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS). IEEE (pp. 3–17). Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Van Der Veen, V., & Platzer, C. (2014). Andrubis–1,000,000 apps later: a view on current android malware behaviors. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS). IEEE (pp. 3–17).
Zurück zum Zitat Luong, N. C., Hoang, D. T., Gong, S., Niyato, D., Wang, P., Liang, Y. C., & Kim, D. I. (2019). Applications of deep reinforcement learning in communications and networking: a survey. IEEE Communications Surveys & Tutorials, 21(4), 3133–3174.CrossRef Luong, N. C., Hoang, D. T., Gong, S., Niyato, D., Wang, P., Liang, Y. C., & Kim, D. I. (2019). Applications of deep reinforcement learning in communications and networking: a survey. IEEE Communications Surveys & Tutorials, 21(4), 3133–3174.CrossRef
Zurück zum Zitat Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2017). Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083. Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2017). Towards deep learning models resistant to adversarial attacks. arXiv:1706.​06083.
Zurück zum Zitat Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z. B., & Swami, A. (2016). The limitations of deep learning in adversarial settings. In 2016 IEEE European symposium on security and privacy (EuroS&P). IEEE (pp. 372–387). Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z. B., & Swami, A. (2016). The limitations of deep learning in adversarial settings. In 2016 IEEE European symposium on security and privacy (EuroS&P). IEEE (pp. 372–387).
Zurück zum Zitat Paudice, A., Muñoz-González, L., & Lupu, E. C. (2018). Label sanitization against label flipping poisoning attacks. In Joint European conference on machine learning and knowledge discovery in databases. Springer (pp. 5–15). Paudice, A., Muñoz-González, L., & Lupu, E. C. (2018). Label sanitization against label flipping poisoning attacks. In Joint European conference on machine learning and knowledge discovery in databases. Springer (pp. 5–15).
Zurück zum Zitat Rathore, H., Agarwal, S., Sahay, S. K., & Sewak, M. (2018). Malware detection using machine learning and deep learning. In International conference on big data analytics. Springer (pp. 402–411). Rathore, H., Agarwal, S., Sahay, S. K., & Sewak, M. (2018). Malware detection using machine learning and deep learning. In International conference on big data analytics. Springer (pp. 402–411).
Zurück zum Zitat Rathore, H., Sahay, S. K., Chaturvedi, P., & Sewak, M. (2018). Android malicious application classification using clustering. In International conference on intelligent systems design and applications. Springer (pp. 659–667). Rathore, H., Sahay, S. K., Chaturvedi, P., & Sewak, M. (2018). Android malicious application classification using clustering. In International conference on intelligent systems design and applications. Springer (pp. 659–667).
Zurück zum Zitat Sahay, S. K., Sharma, A., & Rathore, H. (2020). Evolution of malware and its detection techniques. In Information and communication technology for sustainable development. Springer (pp. 139–150). Sahay, S. K., Sharma, A., & Rathore, H. (2020). Evolution of malware and its detection techniques. In Information and communication technology for sustainable development. Springer (pp. 139–150).
Zurück zum Zitat Serban, A. C., Poll, E., & Visser, J. (2018). Adversarial examples-a complete characterisation of the phenomenon. arXiv:1810.01185. Serban, A. C., Poll, E., & Visser, J. (2018). Adversarial examples-a complete characterisation of the phenomenon. arXiv:1810.​01185.
Zurück zum Zitat Sewak, M., Sahay, S. K., & Rathore, H. (2018). Comparison of deep learning and the classical machine learning algorithm for the malware detection. In 2018 19th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). IEEE (pp. 293– 296). Sewak, M., Sahay, S. K., & Rathore, H. (2018). Comparison of deep learning and the classical machine learning algorithm for the malware detection. In 2018 19th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). IEEE (pp. 293– 296).
Zurück zum Zitat Sharma, A., & Sahay, S. K. (2014). Evolution and detection of polymorphic and metamorphic malwares: a survey. International Journal of Computer Applications, 90(2). Sharma, A., & Sahay, S. K. (2014). Evolution and detection of polymorphic and metamorphic malwares: a survey. International Journal of Computer Applications, 90(2).
Zurück zum Zitat Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: an introduction. Cambridge: MIT Press. Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: an introduction. Cambridge: MIT Press.
Zurück zum Zitat Tam, K., Feizollah, A., Anuar, N. B., Salleh, R., & Cavallaro, L. (2017). The evolution of android malware and android analysis techniques. ACM Computing Surveys (CSUR), 49(4), 1–41.CrossRef Tam, K., Feizollah, A., Anuar, N. B., Salleh, R., & Cavallaro, L. (2017). The evolution of android malware and android analysis techniques. ACM Computing Surveys (CSUR), 49(4), 1–41.CrossRef
Zurück zum Zitat Tramèr, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., & McDaniel, P. (2017). Ensemble adversarial training: attacks and defenses. arXiv:1705.07204. Tramèr, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., & McDaniel, P. (2017). Ensemble adversarial training: attacks and defenses. arXiv:1705.​07204.
Zurück zum Zitat Wu, D. J., Mao, C. H., Wei, T. E., Lee, H. M., & Wu, K. P. (2012). Droidmat: android malware detection through manifest and api calls tracing. In 2012 Seventh Asia joint conference on information security. IEEE (pp. 62–69). Wu, D. J., Mao, C. H., Wei, T. E., Lee, H. M., & Wu, K. P. (2012). Droidmat: android malware detection through manifest and api calls tracing. In 2012 Seventh Asia joint conference on information security. IEEE (pp. 62–69).
Zurück zum Zitat Ye, Y., Li, T., Adjeroh, D., & Iyengar, S. S. (2017). A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR), 50(3), 41.CrossRef Ye, Y., Li, T., Adjeroh, D., & Iyengar, S. S. (2017). A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR), 50(3), 41.CrossRef
Zurück zum Zitat Yerima, S. Y., Sezer, S., McWilliams, G., & Muttik, I. (2013). A new android malware detection approach using bayesian classification. In 2013 IEEE 27th international conference on advanced information networking and applications (AINA). IEEE (pp. 121–128). Yerima, S. Y., Sezer, S., McWilliams, G., & Muttik, I. (2013). A new android malware detection approach using bayesian classification. In 2013 IEEE 27th international conference on advanced information networking and applications (AINA). IEEE (pp. 121–128).
Zurück zum Zitat Yuan, Z., Lu, Y., Wang, Z., & Xue, Y. (2014). Droid-sec: deep learning in android malware detection. In Proceedings of the 2014 ACM conference on SIGCOMM (pp. 371–372). Yuan, Z., Lu, Y., Wang, Z., & Xue, Y. (2014). Droid-sec: deep learning in android malware detection. In Proceedings of the 2014 ACM conference on SIGCOMM (pp. 371–372).
Zurück zum Zitat Zhou, Y., & Jiang, X. (2012). Dissecting android malware: characterization and evolution. In 2012 IEEE symposium on security and privacy. IEEE (pp. 95–109). Zhou, Y., & Jiang, X. (2012). Dissecting android malware: characterization and evolution. In 2012 IEEE symposium on security and privacy. IEEE (pp. 95–109).
Metadaten
Titel
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning
verfasst von
Hemant Rathore
Sanjay K. Sahay
Piyush Nikam
Mohit Sewak
Publikationsdatum
15.11.2020
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 4/2021
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-020-10083-8

Weitere Artikel der Ausgabe 4/2021

Information Systems Frontiers 4/2021 Zur Ausgabe