دورية أكاديمية

A Deep Reinforcement Learning Framework to Evade Black-Box Machine Learning Based IoT Malware Detectors Using GAN-Generated Influential Features

التفاصيل البيبلوغرافية
العنوان: A Deep Reinforcement Learning Framework to Evade Black-Box Machine Learning Based IoT Malware Detectors Using GAN-Generated Influential Features
المؤلفون: Rahat Maqsood Arif, Muhammad Aslam, Shaha Al-Otaibi, Ana Maria Martinez-Enriquez, Tanzila Saba, Saeed Ali Bahaj, Amjad Rehman
المصدر: IEEE Access, Vol 11, Pp 133717-133729 (2023)
بيانات النشر: IEEE, 2023.
سنة النشر: 2023
المجموعة: LCC:Electrical engineering. Electronics. Nuclear engineering
مصطلحات موضوعية: Generative adversarial network, portable executable PE malware, adversarial attack, malware evasion, deep reinforcement learning, technological development, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
الوصف: In the internet of things (IoT) networks, machine learning (ML) is significantly used for malware and adversary detection. Recently, research has shown that adversarial attacks have put ML-based models at risk. This problem is exacerbated in an IoT environment because of the absence of adequate security measures. Consequently, it is crucial to evaluate the strength of such malware detectors using powerful adversarial samples. The existing adversarial sample generation strategies either rely on high-level image features or an unfiltered feature set, making it challenging to determine which feature modifications are crucial in evading malware detection systems, without compromising the malware functionality. This encourages us to propose an evasion framework named IF-MalEvade, based on Generative Adversarial Network (GAN) and Deep Reinforcement Learning (DRL) that effectively generates fully-working, malware samples with several effective perturbations such as header Section manipulation and benign bytes insertion. The DRL framework selects a few suitable action sequences to change malicious samples, thus allowing our malware samples to bypass various black-box ML based malware detectors and the detection search engines of VirusTotal, while maintaining the executability and malicious behavior of the original malware samples. The neural networks of GAN take in the unfiltered feature set of malware dataset and using minimax objective function yields a set of useful features that are subsequently used by the DRL agent to make effective changes. Experimental results illustrated that by utilizing the influential features in sequence of transformations, the adversarial samples generated by our model outperformed the state-of-the-art evasion models with an impressive evasion rate. Additionally, the detection rate of well-known machine learning models was also brought down to up to 97%. Furthermore, when the machine learning models were retrained using adversarial samples, a 35% increase in detection accuracy was observed.
نوع الوثيقة: article
وصف الملف: electronic resource
اللغة: English
تدمد: 2169-3536
Relation: https://ieeexplore.ieee.org/document/10322868/; https://doaj.org/toc/2169-3536
DOI: 10.1109/ACCESS.2023.3334645
URL الوصول: https://doaj.org/article/dc6b7e9829db4be8a663544ad65946c3
رقم الأكسشن: edsdoj.6b7e9829db4be8a663544ad65946c3
قاعدة البيانات: Directory of Open Access Journals
الوصف
تدمد:21693536
DOI:10.1109/ACCESS.2023.3334645