Stealing and evading malware classifiers and antivirus at low false positive conditions
نویسندگان
چکیده
Model stealing attacks have been successfully used in many machine learning domains, but there is little understanding of how these work against models that perform malware detection. Malware detection and, general, security domains unique conditions. In particular, are very strong requirements for low false positive rates (FPR). Antivirus products (AVs) use complex systems to steal, binaries continually change, and the whole environment adversarial by nature. This study evaluates active model publicly available stand-alone classifiers also antivirus products. The proposes a new neural network architecture surrogate (dualFFNN) attack combines transfer creation (FFNN-TL). We achieved good surrogates with up 99\% agreement target models, using less than 4% original training dataset. Good AV were trained 99% 4,000 queries. uses best generate evade both AVs (with without an internet connection). Results show can evades targets lower success rate directly malware. Using surrogates, however, still option since generation highly time-consuming easily detected when connected internet.
منابع مشابه
Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers
Machine learning is widely used to develop classifiers for security tasks. However, the robustness of these methods against motivated adversaries is uncertain. In this work, we propose a generic method to evaluate the robustness of classifiers under attack. The key idea is to stochastically manipulate a malicious sample to find a variant that preserves the malicious behavior but is classified a...
متن کاملPoster: Evading Web Malware Classifiers using Genetic Programming
Malware classifiers based on machine learning models have become increasingly popular. These classifiers use a combination of structural and dynamic features to detect malware in various domains, including PDF, binaries, and web pages. We propose to use genetic programming techniques to automatically generate variants of malicious web pages that evade state-ofthe-art classifiers. Our method bui...
متن کاملPoster: Automatically Evading Classifiers A Case Study on Structural Feature-based PDF Malware Classifiers
Machine learning methods are widely used in security tasks. However, the robustness of these models against motivated adversaries is unclear. In this work, we propose a generic method that simulates evasion attempts to evaluate the robustness of classifiers under attack. We report results from experiments automatically generating malware variants to evade classifiers, from which we have observe...
متن کاملLearning at Low False Positive Rates
Most spam filters are configured for use at a very low falsepositive rate. Typically, the filters are trained with techniques that optimize accuracy or entropy, rather than performance in this configuration. We describe two different techniques for optimizing for the low false-positive region. One method weights good data more than spam. The other method uses a two-stage technique of first find...
متن کاملEvading Machine Learning Malware Detection
Machine learning is a popular approach to signatureless malware detection because it can generalize to never-beforeseen malware families and polymorphic strains. This has resulted in its practical use for either primary detection engines or supplementary heuristic detections by anti-malware vendors. Recent work in adversarial machine learning has shown that models are susceptible to gradient-ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2023
ISSN: ['0167-4048', '1872-6208']
DOI: https://doi.org/10.1016/j.cose.2023.103192