skip to main content
10.1145/3184066.3184078acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlscConference Proceedingsconference-collections
research-article

Implementation of adversarial scenario to malware analytic

Authors Info & Claims
Published:02 February 2018Publication History

ABSTRACT

As the worldwide internet has non-stop developments, it comes with enormous amount automatically generated malware. Those malware had become huge threaten to computer users. A comprehensive malware family classifier can help security researchers to quickly identify characteristics of malware which help malware analysts to investigate in more efficient way. However, despite the assistance of the artificial intelligent (AI) classifiers, it has been shown that the AI-based classifiers are vulnerable to so-called adversarial attacks. In this paper, we demonstrate how the adversarial settings can be applied to the classifier of malware families classification. Our experimental results achieved high successful rate through the adversarial attack. We also find the important features which are ignored by malware analysts but useful in the future analysis.

References

  1. G. E. Dahl, J. W. Stokes, L. Deng, and D. Yu, "Large-scale malware classification using random projections and neural networks," in Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, pp. 3422--3426, IEEE, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  2. I. J. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and harnessing adversarial examples," arXiv preprint arXiv:1412.6572, 2014.Google ScholarGoogle Scholar
  3. N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, "The limitations of deep learning in adversarial settings," in Security and Privacy (EuroS&P), 2016 IEEE European Symposium on, pp. 372--387, IEEE, 2016.Google ScholarGoogle Scholar
  4. "Microsoft Malware Classification Challenge (BIG 2015)." https://www.kaggle.com/c/malware-classification.Google ScholarGoogle Scholar
  5. M. Egele, T. Scholte, E. Kirda, and C. Kruegel, "A survey on automated dynamic malware-analysis techniques and tools," ACM Computing Surveys, vol. 44, pp. 1--12, Feb. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Damodaran, F. Di Troia, C. A. Visaggio, T. H. Austin, and M. Stamp, "A comparison of static, dynamic, and hybrid analysis for malware detection," Journal of Computer Virology and Hacking Techniques, vol. 13, no. 1, pp. 1--12, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  7. X. Wang and S. M. Yiu, "A multi-task learning model for malware classification with useful file access pattern from API call sequence," arXiv preprint arXiv:1610.05945, 2016.Google ScholarGoogle Scholar
  8. W. S. McCulloch and W. Pitts, "A logical calculus of the ideas immanent in nervous activity," Bulletin of mathematical biology, vol. 52, no. 1, pp. 99--115, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  9. Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner, "Gradient-based learning applied to document recognition," Proceedings of the IEEE, vol. 86, pp. 2278--2324, Nov. 1998.Google ScholarGoogle ScholarCross RefCross Ref
  10. A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," in Advances in neural information processing systems, pp. 1097--1105, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, "Going deeper with convolutions," pp. 1--9, June 2015.Google ScholarGoogle Scholar
  12. D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. van den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner, I. Sutskever, T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel, and D. Hassabis, "Mastering the game of Go with deep neural networks and tree search," Nature, vol. 529, pp. 484--489, Jan. 2016.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. S. Sutton, D. A. McAllester, S. P. Singh, and Y. Mansour, "Policy gradient methods for reinforcement learning with function approximation," in Advances in neural information processing systems, pp. 1057--1063, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Coulom, "Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search," in Proceedings of the 5th International Conference on Computers and Games, CG'06, (Berlin, Heidelberg), pp. 72--83, Springer-Verlag, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Ciregan, U. Meier, and J. Schmidhuber, "Multi-column deep neural networks for image classification," in 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3642--3649, June 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Papernot, P. McDaniel, I. Goodfellow, S. Jha, Z. B. Celik, and A. Swami, "Practical Black-Box Attacks against Machine Learning," pp. 506--519, ACM Press, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. B. Biggio, G. Fumera, and F. Roli, "Pattern recognition systems under attack: Design issues and research challenges," International Journal of Pattern Recognition and Artificial Intelligence, vol. 28, no. 07, p. 1460002, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  18. L. Huang, A. D. Joseph, B. Nelson, B. I. Rubinstein, and J. D. Tygar, "Adversarial machine learning," in Proceedings of the 4th ACM workshop on Security and artificial intelligence, pp. 43--58, ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. I. Goodfellow, N. Papernot, and P. McDaniel, "cleverhans v0. 1: an adversarial machine learning library," arXiv preprint arXiv:1610.00768, 2016.Google ScholarGoogle Scholar
  20. K. Simonyan, A. Vedaldi, and A. Zisserman, "Deep inside convolutional networks: Visualising image classification models and saliency maps," CoRR, vol. abs/1312.6034, 2013.Google ScholarGoogle Scholar
  21. "VirTool:Win32/Obfuscator.ACY threat description - Windows Defender Security Intelligence."Google ScholarGoogle Scholar

Index Terms

  1. Implementation of adversarial scenario to malware analytic

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICMLSC '18: Proceedings of the 2nd International Conference on Machine Learning and Soft Computing
        February 2018
        198 pages
        ISBN:9781450363365
        DOI:10.1145/3184066

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 February 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader