IDEAS home Printed from https://ideas.repec.org/a/plo/pone00/0231626.html
   My bibliography  Save this article

DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model

Author

Listed:
  • Yong Fang
  • Yuetian Zeng
  • Beibei Li
  • Liang Liu
  • Lei Zhang

Abstract

Deep learning methods are being increasingly widely used in static malware detection field because they can summarize the feature of malware and its variants that have never appeared before. But similar to the picture recognition model, the static malware detection model based on deep learning is also vulnerable to the interference of adversarial samples. When the input feature vectors of the malware detection model is based on static features of Windows PE (Portable Executable, PE) file, the model is vulnerable to gradient-based attacks. Regarding the issue above, a method of adversarial sample generation is proposed, which can summarize the blind spots of the original detection model. However, the existing malware adversarial sample generation method is not universal and low in generation efficiency due to the need for human control and difficulty in maintaining a normal file format. In response to these problems, this paper proposes a novel method of automatic adversarial samples generation based on deep reinforcement learning. Firstly, a static PE malware detection model based on deep learning called DeepDetectNet is constructed, the original AUC of which can reach 0.989. Then, an adversarial sample generation model based on reinforcement learning called RLAttackNet is implemented, which generates malware samples that can bypass DeepDetectNet. Finally, when we re-input the adversarial samples into the previously trained DeepDetectNet, the original defects of DeepDetectNet can be reinforced. Experimental results show that the RLAttackNet proposed in this paper can generate about 19.13% of malware samples bypass DeepDetectNet. When DeepDetectNet is retrained with these adversarial samples, the AUC value improves from 0.989 to 0.996 and attack success rate has a significant drop, from 19.13% to 3.1%, compared with the original model.

Suggested Citation

  • Yong Fang & Yuetian Zeng & Beibei Li & Liang Liu & Lei Zhang, 2020. "DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model," PLOS ONE, Public Library of Science, vol. 15(4), pages 1-32, April.
  • Handle: RePEc:plo:pone00:0231626
    DOI: 10.1371/journal.pone.0231626
    as

    Download full text from publisher

    File URL: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0231626
    Download Restriction: no

    File URL: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0231626&type=printable
    Download Restriction: no

    File URL: https://libkey.io/10.1371/journal.pone.0231626?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Firdaus Afifi & Nor Badrul Anuar & Shahaboddin Shamshirband & Kim-Kwang Raymond Choo, 2016. "DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware," PLOS ONE, Public Library of Science, vol. 11(9), pages 1-21, September.
    2. Di Xue & Jingmei Li & Weifei Wu & Qiao Tian & JiaXiang Wang, 2019. "Homology analysis of malware based on ensemble learning and multifeatures," PLOS ONE, Public Library of Science, vol. 14(8), pages 1-23, August.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mohamad Hazim & Nor Badrul Anuar & Mohd Faizal Ab Razak & Nor Aniza Abdullah, 2018. "Detecting opinion spams through supervised boosting approach," PLOS ONE, Public Library of Science, vol. 13(6), pages 1-23, June.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0231626. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.