论文标题
Malfox:基于Conv-Gans针对黑盒探测器的伪装的对抗性恶意软件示例生成
MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors
论文作者
论文摘要
深度学习是一个蓬勃发展的领域,目前塞满了许多实际应用和积极的研究主题。它允许计算机从经验中学习并从概念的层次结构来了解世界,每台通过与更简单的概念的关系来定义。依靠深度学习的强大功能,我们提出了一个卷积的基于对抗网络(Conv-GAN)的框架,名为Malfox,以第三方黑盒恶意软件检测器为目标。 Malfox通过恶意软件作者和恶意软件探测器之间的竞争对手游戏进行了激励,采用了一种对抗性方法来产生扰动路径,每种方法都由多达三种方法(即obfusmal,kethmal和hollowmal)形成,以生成对抗性恶意软件示例。为了证明Malfox的有效性,我们收集了一个由恶意软件和良性软件程序组成的大型数据集,并根据精确,检测率和生成的对抗性恶意软件示例的速率研究Malfox的性能。我们的评估表明,准确性可以高达99.0%,这显着超过了其他12个知名学习模型。此外,检测率平均降低了56.8%,平均回避率明显提高了56.2%。
Deep learning is a thriving field currently stuffed with many practical applications and active research topics. It allows computers to learn from experience and to understand the world in terms of a hierarchy of concepts, with each being defined through its relations to simpler concepts. Relying on the strong capabilities of deep learning, we propose a convolutional generative adversarial network-based (Conv-GAN) framework titled MalFox, targeting adversarial malware example generation against third-party black-box malware detectors. Motivated by the rival game between malware authors and malware detectors, MalFox adopts a confrontational approach to produce perturbation paths, with each formed by up to three methods (namely Obfusmal, Stealmal, and Hollowmal) to generate adversarial malware examples. To demonstrate the effectiveness of MalFox, we collect a large dataset consisting of both malware and benignware programs, and investigate the performance of MalFox in terms of accuracy, detection rate, and evasive rate of the generated adversarial malware examples. Our evaluation indicates that the accuracy can be as high as 99.0% which significantly outperforms the other 12 well-known learning models. Furthermore, the detection rate is dramatically decreased by 56.8% on average, and the average evasive rate is noticeably improved by up to 56.2%.