A Practical Adversarial Attack against Sequence-based Deep Learning Malware Classifiers
By: Kai Tan , Dongyang Zhan , Lin Ye and more
Potential Business Impact:
Makes malware trick security programs better.
Sequence-based deep learning models (e.g., RNNs), can detect malware by analyzing its behavioral sequences. Meanwhile, these models are susceptible to adversarial attacks. Attackers can create adversarial samples that alter the sequence characteristics of behavior sequences to deceive malware classifiers. The existing methods for generating adversarial samples typically involve deleting or replacing crucial behaviors in the original data sequences, or inserting benign behaviors that may violate the behavior constraints. However, these methods that directly manipulate sequences make adversarial samples difficult to implement or apply in practice. In this paper, we propose an adversarial attack approach based on Deep Q-Network and a heuristic backtracking search strategy, which can generate perturbation sequences that satisfy practical conditions for successful attacks. Subsequently, we utilize a novel transformation approach that maps modifications back to the source code, thereby avoiding the need to directly modify the behavior log sequences. We conduct an evaluation of our approach, and the results confirm its effectiveness in generating adversarial samples from real-world malware behavior sequences, which have a high success rate in evading anomaly detection models. Furthermore, our approach is practical and can generate adversarial samples while maintaining the functionality of the modified software.
Similar Papers
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning
Cryptography and Security
Stops bad computer programs from tricking security software.
Evasive Ransomware Attacks Using Low-level Behavioral Adversarial Examples
Cryptography and Security
Makes malware hide from computer defenses.
A Statistical Method for Attack-Agnostic Adversarial Attack Detection with Compressive Sensing Comparison
Cryptography and Security
Stops sneaky computer tricks from fooling smart programs.