Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Backdoor confrontation sample generation method of PE malicious software detection model

A technology for detecting models and malware, applied in neural learning methods, biological neural network models, computer components, etc. Robustness, the effect of reducing computational overhead

Active Publication Date: 2021-08-13
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the generation method of adversarial samples for PE malware has the characteristics of poor generalization ability and high computational overhead. The construction of adversarial samples is generally designed for a specific detection model, which limits the generalization ability of adversarial samples on other detection models.
The construction of black-box adversarial samples requires a large number of query operations on the detection model to clarify the deceptive effect of the adversarial samples on the model. In practice, a large number of queries are time-consuming and laborious, which reduces the practicability of the adversarial sample generation method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Backdoor confrontation sample generation method of PE malicious software detection model
  • Backdoor confrontation sample generation method of PE malicious software detection model
  • Backdoor confrontation sample generation method of PE malicious software detection model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to better illustrate the objects and advantages of the present invention, the embodiments of the methods of the invention will be further described in detail below.

[0023] Experimental data from malicious software static feature dataset EMBER2017 and Virusshare.com public PE malware. The EMBER2017 data set contains feature data extracted from 1.1M binary. The training set contains 900K samples, including 300K-based samples, 300K malicious samples, and 300K no label samples; test sets contain 200K samples, including 100K A wellness sample and 100K malicious samples. Public PE malware from Virusshare.com is used to simulate the actual attack effect.

[0024] Table 1PE malware black box to the anti-sample generation experimental data

[0025]

[0026] This experiment is carried out on a computer, and the specific configuration of the computer is: Inter i7-7500U, CPU3.1GHz, memory 8G, operating system is Windows 10.

[0027] The specific process is:

[0028] Step 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a backdoor confrontation sample generation method of a PE malicious software detection model based on R-DBSCAN, and belongs to the field of computer malicious software detection. The method mainly aims at solving the problem that a malicious software detection model is high in attack difficulty under the black box condition. The method comprises the following steps: firstly, acquiring a PE sample from a public data set, training a proxy training model, and reducing the dimension of the data set by adopting an SHAP value; clustering the samples by adopting an R-DBSCAN method, and taking a center node of each cluster as a sampling point to construct a new data set; training a neural network model; respectively inputting malicious and benign sample files, and recording neurons which greatly influence a classification result according to the weight change condition of the neurons in the neural network; embedding a character string with any length into the empty PE file, taking a character string which greatly influences the character string according to the weight change condition of the neuron, and recording the neuron; embedding a trigger into an original malicious PE file, and modifying a label to achieve adversarial training of a neural network.

Description

Technical field [0001] The present invention relates to a rear door counterpart generation method of a PE malware detection model, belonging to the field of computer malware detection. Background technique [0002] Testing techniques for malware have always had a rapid development, but the number of new numbers of malware is still very considerable. With the development of deep learning, it becomes a variety of PE malware detection methods based on deep learning. Static analysis of PE files, extracts document 16 Enciprome data characteristics, use depth learning methods learning characteristics, this type of method is currently able to achieve detection of malware with higher accuracy. However, such malware detection models ignore the safety of the detection system itself and the reliability of the data itself during the development process. If the malware detection model encounters an attacker inserted into the back door during the training process, the detection model will guar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06K9/62G06N3/04G06N3/08
CPCG06F21/56G06N3/08G06N3/048G06N3/045G06F18/23
Inventor 罗森林韩飞潘丽敏张笈
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products