4.5 Article

Auditing static machine learning anti-Malware tools against metamorphic attacks

Journal

COMPUTERS & SECURITY
Volume 102, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2020.102159

Keywords

Malware analysis; Malware classification; Software obfuscation; N-Gram extraction; Machine learning; Deep learning

Funding

  1. Spanish MICINN [TIN2015-71799-C2-2-P, PID2019-111544GBC22]
  2. University of Lleida

Ask authors/readers for more resources

Malicious software poses a serious threat on the internet, with traditional detection methods struggling to keep up. Machine learning and deep learning engines have shown promise in handling complex malware and new variants effectively. Further research is needed to improve classification performance and vulnerabilities to adversarial examples.
Malicious software is one of the most serious cyber threats on the Internet today. Traditional malware detection has proven unable to keep pace with the sheer number of malware because of their growing complexity, new attacks and variants. Most malware implement various metamorphic techniques in order to disguise themselves, therefore preventing successful analysis and thwarting the detection by signature-based anti-malware engines. During the past decade, there has been an increase in the research and deployment of anti-malware engines powered by machine learning, and in particular deep learning, due to their ability to handle huge volumes of malware and generalize to never-before-seen samples. However, there is little research about the vulnerability of these models to adversarial examples. To fill this gap, this paper presents an exhaustive evaluation of the state-of-the-art approaches for malware classification against common metamorphic attacks. Given the limitations found in deep learning approaches, we present a simple architecture that increases 14.95% the classification performance with respect to MalConv's architecture. Furthermore, the use of the metamorphic techniques to augment the training set is investigated and results show that it significantly improves the classification of malware belonging to families with few samples. (C) 2020 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available