DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.

Deep learning methods are being increasingly widely used in static malware detection field because they can summarize the feature of malware and its variants that have never appeared before. But similar to the picture recognition model, the static malware detection model based on deep learning is al...

Full description

Bibliographic Details
Main Authors: Yong Fang, Yuetian Zeng, Beibei Li, Liang Liu, Lei Zhang
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2020-01-01
Series:PLoS ONE
Online Access:https://doi.org/10.1371/journal.pone.0231626
id doaj-c9d831c2e2fb455294cd412c6d7f3f04
record_format Article
spelling doaj-c9d831c2e2fb455294cd412c6d7f3f042021-03-03T21:41:37ZengPublic Library of Science (PLoS)PLoS ONE1932-62032020-01-01154e023162610.1371/journal.pone.0231626DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.Yong FangYuetian ZengBeibei LiLiang LiuLei ZhangDeep learning methods are being increasingly widely used in static malware detection field because they can summarize the feature of malware and its variants that have never appeared before. But similar to the picture recognition model, the static malware detection model based on deep learning is also vulnerable to the interference of adversarial samples. When the input feature vectors of the malware detection model is based on static features of Windows PE (Portable Executable, PE) file, the model is vulnerable to gradient-based attacks. Regarding the issue above, a method of adversarial sample generation is proposed, which can summarize the blind spots of the original detection model. However, the existing malware adversarial sample generation method is not universal and low in generation efficiency due to the need for human control and difficulty in maintaining a normal file format. In response to these problems, this paper proposes a novel method of automatic adversarial samples generation based on deep reinforcement learning. Firstly, a static PE malware detection model based on deep learning called DeepDetectNet is constructed, the original AUC of which can reach 0.989. Then, an adversarial sample generation model based on reinforcement learning called RLAttackNet is implemented, which generates malware samples that can bypass DeepDetectNet. Finally, when we re-input the adversarial samples into the previously trained DeepDetectNet, the original defects of DeepDetectNet can be reinforced. Experimental results show that the RLAttackNet proposed in this paper can generate about 19.13% of malware samples bypass DeepDetectNet. When DeepDetectNet is retrained with these adversarial samples, the AUC value improves from 0.989 to 0.996 and attack success rate has a significant drop, from 19.13% to 3.1%, compared with the original model.https://doi.org/10.1371/journal.pone.0231626
collection DOAJ
language English
format Article
sources DOAJ
author Yong Fang
Yuetian Zeng
Beibei Li
Liang Liu
Lei Zhang
spellingShingle Yong Fang
Yuetian Zeng
Beibei Li
Liang Liu
Lei Zhang
DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.
PLoS ONE
author_facet Yong Fang
Yuetian Zeng
Beibei Li
Liang Liu
Lei Zhang
author_sort Yong Fang
title DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.
title_short DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.
title_full DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.
title_fullStr DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.
title_full_unstemmed DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.
title_sort deepdetectnet vs rlattacknet: an adversarial method to improve deep learning-based static malware detection model.
publisher Public Library of Science (PLoS)
series PLoS ONE
issn 1932-6203
publishDate 2020-01-01
description Deep learning methods are being increasingly widely used in static malware detection field because they can summarize the feature of malware and its variants that have never appeared before. But similar to the picture recognition model, the static malware detection model based on deep learning is also vulnerable to the interference of adversarial samples. When the input feature vectors of the malware detection model is based on static features of Windows PE (Portable Executable, PE) file, the model is vulnerable to gradient-based attacks. Regarding the issue above, a method of adversarial sample generation is proposed, which can summarize the blind spots of the original detection model. However, the existing malware adversarial sample generation method is not universal and low in generation efficiency due to the need for human control and difficulty in maintaining a normal file format. In response to these problems, this paper proposes a novel method of automatic adversarial samples generation based on deep reinforcement learning. Firstly, a static PE malware detection model based on deep learning called DeepDetectNet is constructed, the original AUC of which can reach 0.989. Then, an adversarial sample generation model based on reinforcement learning called RLAttackNet is implemented, which generates malware samples that can bypass DeepDetectNet. Finally, when we re-input the adversarial samples into the previously trained DeepDetectNet, the original defects of DeepDetectNet can be reinforced. Experimental results show that the RLAttackNet proposed in this paper can generate about 19.13% of malware samples bypass DeepDetectNet. When DeepDetectNet is retrained with these adversarial samples, the AUC value improves from 0.989 to 0.996 and attack success rate has a significant drop, from 19.13% to 3.1%, compared with the original model.
url https://doi.org/10.1371/journal.pone.0231626
work_keys_str_mv AT yongfang deepdetectnetvsrlattacknetanadversarialmethodtoimprovedeeplearningbasedstaticmalwaredetectionmodel
AT yuetianzeng deepdetectnetvsrlattacknetanadversarialmethodtoimprovedeeplearningbasedstaticmalwaredetectionmodel
AT beibeili deepdetectnetvsrlattacknetanadversarialmethodtoimprovedeeplearningbasedstaticmalwaredetectionmodel
AT liangliu deepdetectnetvsrlattacknetanadversarialmethodtoimprovedeeplearningbasedstaticmalwaredetectionmodel
AT leizhang deepdetectnetvsrlattacknetanadversarialmethodtoimprovedeeplearningbasedstaticmalwaredetectionmodel
_version_ 1714815693077086208