Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection

5G is about to open Pandora’s box of security threats to the Internet of Things (IoT). Key technologies, such as network function virtualization and edge computing introduced by the 5G network, bring new security threats and risks to the Internet infrastructure. Therefore, higher detection and defen...

Full description

Bibliographic Details
Main Authors: Fangwei Wang, Yuanyuan Lu, Changguang Wang, Qingru Li
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2021/8736946
id doaj-a29ab16e3a11482a844cd1c798e1d1e6
record_format Article
spelling doaj-a29ab16e3a11482a844cd1c798e1d1e62021-09-13T01:23:17ZengHindawi-WileyWireless Communications and Mobile Computing1530-86772021-01-01202110.1155/2021/8736946Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware DetectionFangwei Wang0Yuanyuan Lu1Changguang Wang2Qingru Li3College of Computer & Cyber SecurityCollege of Computer & Cyber SecurityCollege of Computer & Cyber SecurityCollege of Computer & Cyber Security5G is about to open Pandora’s box of security threats to the Internet of Things (IoT). Key technologies, such as network function virtualization and edge computing introduced by the 5G network, bring new security threats and risks to the Internet infrastructure. Therefore, higher detection and defense against malware are required. Nowadays, deep learning (DL) is widely used in malware detection. Recently, research has demonstrated that adversarial attacks have posed a hazard to DL-based models. The key issue of enhancing the antiattack performance of malware detection systems that are used to detect adversarial attacks is to generate effective adversarial samples. However, numerous existing methods to generate adversarial samples are manual feature extraction or using white-box models, which makes it not applicable in the actual scenarios. This paper presents an effective binary manipulation-based attack framework, which generates adversarial samples with an evolutionary learning algorithm. The framework chooses some appropriate action sequences to modify malicious samples. Thus, the modified malware can successfully circumvent the detection system. The evolutionary algorithm can adaptively simplify the modification actions and make the adversarial sample more targeted. Our approach can efficiently generate adversarial samples without human intervention. The generated adversarial samples can effectively combat DL-based malware detection models while preserving the consistency of the executable and malicious behavior of the original malware samples. We apply the generated adversarial samples to attack the detection engines of VirusTotal. Experimental results illustrate that the adversarial samples generated by our method reach an evasion success rate of 47.8%, which outperforms other attack methods. By adding adversarial samples in the training process, the MalConv network is retrained. We show that the detection accuracy is improved by 10.3%.http://dx.doi.org/10.1155/2021/8736946
collection DOAJ
language English
format Article
sources DOAJ
author Fangwei Wang
Yuanyuan Lu
Changguang Wang
Qingru Li
spellingShingle Fangwei Wang
Yuanyuan Lu
Changguang Wang
Qingru Li
Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
Wireless Communications and Mobile Computing
author_facet Fangwei Wang
Yuanyuan Lu
Changguang Wang
Qingru Li
author_sort Fangwei Wang
title Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
title_short Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
title_full Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
title_fullStr Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
title_full_unstemmed Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
title_sort binary black-box adversarial attacks with evolutionary learning against iot malware detection
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8677
publishDate 2021-01-01
description 5G is about to open Pandora’s box of security threats to the Internet of Things (IoT). Key technologies, such as network function virtualization and edge computing introduced by the 5G network, bring new security threats and risks to the Internet infrastructure. Therefore, higher detection and defense against malware are required. Nowadays, deep learning (DL) is widely used in malware detection. Recently, research has demonstrated that adversarial attacks have posed a hazard to DL-based models. The key issue of enhancing the antiattack performance of malware detection systems that are used to detect adversarial attacks is to generate effective adversarial samples. However, numerous existing methods to generate adversarial samples are manual feature extraction or using white-box models, which makes it not applicable in the actual scenarios. This paper presents an effective binary manipulation-based attack framework, which generates adversarial samples with an evolutionary learning algorithm. The framework chooses some appropriate action sequences to modify malicious samples. Thus, the modified malware can successfully circumvent the detection system. The evolutionary algorithm can adaptively simplify the modification actions and make the adversarial sample more targeted. Our approach can efficiently generate adversarial samples without human intervention. The generated adversarial samples can effectively combat DL-based malware detection models while preserving the consistency of the executable and malicious behavior of the original malware samples. We apply the generated adversarial samples to attack the detection engines of VirusTotal. Experimental results illustrate that the adversarial samples generated by our method reach an evasion success rate of 47.8%, which outperforms other attack methods. By adding adversarial samples in the training process, the MalConv network is retrained. We show that the detection accuracy is improved by 10.3%.
url http://dx.doi.org/10.1155/2021/8736946
work_keys_str_mv AT fangweiwang binaryblackboxadversarialattackswithevolutionarylearningagainstiotmalwaredetection
AT yuanyuanlu binaryblackboxadversarialattackswithevolutionarylearningagainstiotmalwaredetection
AT changguangwang binaryblackboxadversarialattackswithevolutionarylearningagainstiotmalwaredetection
AT qingruli binaryblackboxadversarialattackswithevolutionarylearningagainstiotmalwaredetection
_version_ 1717755051862130688