Skip to main content

A Feature-Based Detection System of Adversarial Sample Attack

  • Conference paper
  • First Online:
Machine Learning for Cyber Security (ML4CS 2020)

Abstract

With the increase of malware, traditional malicious detection methods are not suitable to high-intensity detection work. In response to this question, many malware detection methods based on Machine Learning (ML-based) are proposed to address this problem. However, the ML-based detection method is vulnerable to the attack from adversarial samples. To overcome the limitation, we present our model. We protect the classification model from adversarial example attack by quantifying the similarity between the extracted image features and the expected features of the prediction class. Experimental results demonstrate that our model can detect the misclassification caused by adversarial samples with a higher accuracy than that of the Resnet-50.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bayer, U., Moser, A., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. J. Comput. Virol. 2(1), 67–77 (2006)

    Article  Google Scholar 

  2. Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classifification: a survey. J. Inf. Secur. 5(2), 56–64 (2014)

    Google Scholar 

  3. IGoodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial samples. arXiv preprint arXiv:1412.6572 (2015)

  4. Rhode, M., Burnap, P., Jones, K.: Early stage malware prediction using recurrent neural networks. Comput. Secur. 77(8), 578–594 (2018)

    Article  Google Scholar 

  5. HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.K.R.: A deep recurrent neural network based approach for Internet of things malware threat hunting. Future Genera. Comput. Syst. 5(1), 88–96 (2018). https://doi.org/10.1016/j.future.2018.03.007

    Article  Google Scholar 

  6. Wang, W., Zhao, M., Wang, J.: Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J. Ambient Intell. Humanized Comput. 10(8), 3035–3043 (2018). https://doi.org/10.1007/s12652-018-0803-6

    Article  Google Scholar 

  7. Vasan, D., Alazab, M., Wassan, S., Naeem, H., Safaei, B., Zheng, Q.: IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture. Comput. Netw. 171(4), 107138 (2020). https://doi.org/10.1016/j.comnet.2020.107138

    Article  Google Scholar 

  8. Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classifification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, New York, NY, USA, pp. 1–7. ACM (2011)

    Google Scholar 

  9. Nataraj, L., Yegneswaran, V., Porras, P., Zhang, J.: A comparative assessment of malware classifification using binary texture analysis and dynamic analysis. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, New York, NY, USA, pp. 21–30. ACM (2011)

    Google Scholar 

  10. Kalash, M., Rochan, M., Mohammed, N., Bruce, N.D.B., Wang, Y., Iqbal, F.: Malware classification with deep convolutional neural networks. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5 IEEE (2018)

    Google Scholar 

  11. Zhang, C., Yang, X., Tang, Y., Zhang, W.: Learning to generate radar image sequences using two-stage generative adversarial networks. IEEE Geoence Remote Sens. Lett. 17(3), 401–405 (2020)

    Article  Google Scholar 

  12. Huang, R., Xu, B., Schuurmans, D., Szepesvári, C.: Learning with a strong adversary. arXiv preprint arXiv:1511.03034 (2015)

  13. Meng, D., Chen, H.: MagNet: a two-pronged defense against adversarial samples. [Online]. Available: https://arxiv.org/abs/1705.09064. (2017)

  14. Parmuval, P., Hasan, M., Patel, S.: Malware family detection approach using image processing techniques: Visualization technique. Int. J. Comput. Appl. Technol. Res. 7(20), 129–132 (2018). https://doi.org/10.7753/IJCATR0703.1004

    Article  Google Scholar 

  15. Liu, X., Zhang, J., Lin, Y., Li, H.: ATMPA: attacking machine learningbased malware visualization detection methods via adversarial examples. In: Proceedings of the International Symposium on Quality of Service (IWQoS 2019), Phoenix, AZ, USA, pp. 1–38. IEEE (2019)

    Google Scholar 

  16. Wang, L., Liu, J., Chen, X.: Microsoft malware classification challenge. [Online]. Available: https://arxiv.org/abs/1802.10135v1 (2018)

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grants No. 61572170 and 61672206, Program for Hundreds of Outstanding Innovative Talents in Higher Education Institutions of Hebei Province (III) under Grant No. SLRC2017042, and Natural Science Foundation of Hebei Province of China under Grant No. F2019205163, and department of Human Resoueces and Social Security of Hebei Province under Grant No. 201901028.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changguang Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, F., Lu, Y., Li, Q., Wang, C. (2020). A Feature-Based Detection System of Adversarial Sample Attack. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12487. Springer, Cham. https://doi.org/10.1007/978-3-030-62460-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62460-6_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62459-0

  • Online ISBN: 978-3-030-62460-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics