陈镭, 杨章静, 黄璞. 融合特征选择的Android恶意逃避攻击研究[J]. 微电子学与计算机, 2021, 38(3): 89-94.
引用本文: 陈镭, 杨章静, 黄璞. 融合特征选择的Android恶意逃避攻击研究[J]. 微电子学与计算机, 2021, 38(3): 89-94.
CHEN Lei, YANG Zhang-jing, HUANG Pu. Research on android malicious evasion attack based on feature selection[J]. Microelectronics & Computer, 2021, 38(3): 89-94.
Citation: CHEN Lei, YANG Zhang-jing, HUANG Pu. Research on android malicious evasion attack based on feature selection[J]. Microelectronics & Computer, 2021, 38(3): 89-94.

融合特征选择的Android恶意逃避攻击研究

Research on android malicious evasion attack based on feature selection

  • 摘要: 机器学习系统以其强大的自适应性、自学习能力,越来越多的应用到Android恶意软件检测领域,取得了显著的检测效果.然而,机器学习算法和样本本身还面临着诸多安全威胁,一些经过精心策划的攻击,希望颠覆这些算法并允许恶意行为对抗检测.首先以Drebin系统为例介绍了基于机器学习的Android恶意软件检测方法的原理,然后在攻击目标、攻击策略的基础了提出了针对机器学习分类器的逃避攻击模型.在综合考虑特征权重、可修改性、修改成本的基础上,提出了一种恶意对抗样本生成方法.实验结果表明,只需要修改很少量的特征,就能够逃避线性SVM分类器的检测,最后用一个具体的恶意样本逃避实例验证了提出方法的有效性.

     

    Abstract: With its strong self-adaptability and self-learning ability, machine learning systems are increasingly used in the field of Android malware detection and have achieved remarkable detection results. However, machine learning algorithms and samples themselves also face many security threats, some well-designed attacks, hoping to subvert these algorithms and allow malicious behavior to resist detection. Firstly, the principle of machine learning-based detection method is introduced by taking the Drebin system as an example, and then an evasion attack model for machine learning classifier is proposed based on the attack target and attack strategy. Based on the comprehensive consideration of feature weight, modifiability and modification cost, proposes a malicious countermeasure sample generation method. The experimental results show that only a few features need to be modified to evade the detection of the linear SVM classifier. Finally, a specific example of malicious sample evasion attack verifies the effectiveness of the proposed method.

     

/

返回文章
返回