Examining Adversarial Learning against Graph-based IoT Malware Detection Systems

02/12/2019
by   Ahmed Abusnaina, et al.
0

The main goal of this study is to investigate the robustness of graph-based Deep Learning (DL) models used for Internet of Things (IoT) malware classification against Adversarial Learning (AL). We designed two approaches to craft adversarial IoT software, including Off-the-Shelf Adversarial Attack (OSAA) methods, using six different AL attack approaches, and Graph Embedding and Augmentation (GEA). The GEA approach aims to preserve the functionality and practicality of the generated adversarial sample through a careful embedding of a benign sample to a malicious one. Our evaluations demonstrate that OSAAs are able to achieve a misclassification rate (MR) of 100 that the GEA approach is able to misclassify all IoT malware samples as benign.

READ FULL TEXT

page 1

page 2

research
05/14/2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

The wide acceptance of Internet of Things (IoT) for both household and i...
research
05/14/2020

Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

The wide acceptance of Internet of Things (IoT) for both household and i...
research
04/16/2022

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

In recent years, malware detection has become an active research topic i...
research
09/20/2019

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Despite many attempts, the state-of-the-art of adversarial machine learn...
research
02/12/2019

Adversarial Samples on Android Malware Detection Systems for IoT Systems

Many IoT(Internet of Things) systems run Android systems or Android-like...
research
04/12/2021

Deep Learning for IoT

Deep learning and other machine learning approaches are deployed to many...
research
09/11/2020

Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection

To address the costs of reverse engineering and signature extraction, ad...

Please sign up or login with your details

Forgot password? Click here to reset