169
Views
0
CrossRef citations to date
0
Altmetric
Articles

Anti-malware engines under adversarial attacks

ORCID Icon & ORCID Icon
Pages 791-804 | Received 09 Jul 2020, Accepted 04 Jun 2021, Published online: 20 Jun 2021
 

Abstract

Mobile phones have crawled into our lives with such rapidity and have reformed our lives in a short span. Malware is entangled with all forms of mobile applications causing havoc and distress. State of the art malware detection systems have exercised learning-based techniques successfully to discriminate benign contents from malware. But, Machine Learning (ML) models are vulnerable to adversarial samples and are not intrinsically robust against adversarial attacks. The adversarial samples generated against ML models degrade the model's performance. Adversarial attacks are utilized by malware authors to hinder the working of ML-based malware detection approaches. This article coheres into the effects of evasion attacks on an anti-malware engine utilizing a feed forward deep neural network model. Experiments on Android malware apps is explored by structuring a comprehensive feature engineering scheme for the Drebin dataset through static analysis. The results demonstrate the realistic threat and demand the need to develop adaptive defenses to foster a secure learning model which is immune to adversarial attacks.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

Shymalagowri Selvaganapathy

Shymalagowri Selvaganapathy is working as Assistant Professor in the department of Information Technology, PSG College of Technology, India since 2012. Her research interests include Malware detection, Adversarial machine learning, Attacks and Defense techniques and Information Security.

Sudha Sadasivam

Dr. Sudha Sadasivam is working as a Professor as is heading the Department of Computer Science and Engineering in PSG College of Technology, India. Her areas of interest include distributed systems, distributed object technology, and grid and cloud computing. She has published 75+ papers in refereed international and national journals, and at conferences. She has published five books in her areas of interest. She has coordinated two AICTE RPS projects in distributed and grid computing arena. She is also the coordinator for PSG-Yahoo research on grid and cloud computing.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.