Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques
نویسندگان
چکیده
Abstract Recent progress in machine learning has led to promising results behavioral malware detection. Behavioral modeling identifies malicious processes via features derived by their runtime behavior. hold great promise as they are intrinsically related the functioning of each malware, and therefore considered difficult evade. Indeed, while a significant amount exists on evasion static features, dynamic seen limited work. This paper examines robustness ransomware detectors proposes multiple novel techniques evade them. Ransomware behavior differs significantly from that benign processes, making it an ideal best case for detectors, candidate evasion. We identify propose set attacks distribute overall workload across small independent, cooperating order avoid generation features. Our most effective attack decreases accuracy state-of-the-art classifier 98.6 0% using only 18 processes. Furthermore, we show our be against commercial black-box setting. Finally, evaluate detector designed attack, well discuss potential directions mitigate advanced attack.
منابع مشابه
Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers
Machine learning is widely used to develop classifiers for security tasks. However, the robustness of these methods against motivated adversaries is uncertain. In this work, we propose a generic method to evaluate the robustness of classifiers under attack. The key idea is to stochastically manipulate a malicious sample to find a variant that preserves the malicious behavior but is classified a...
متن کاملQuery Strategies for Evading Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can systematically query a classifier to elicit information that allows the adversary to evade detection while incurring a near-minimal cost of modifying their intended malfeasance. We generalize the theory of Lowd and Meek (2005) to the family of convex-inducing classifiers that partition input space into two ...
متن کاملEvading Machine Learning Malware Detection
Machine learning is a popular approach to signatureless malware detection because it can generalize to never-beforeseen malware families and polymorphic strains. This has resulted in its practical use for either primary detection engines or supplementary heuristic detections by anti-malware vendors. Recent work in adversarial machine learning has shown that models are susceptible to gradient-ba...
متن کاملEvading Anti-debugging Techniques with Binary Substitution
Anti-debugging technology refers to various ways of preventing binary files from being analyzed in debuggers or other virtual machine environments. If binary files conceal or modify themself using anti-debugging techniques, analyzing these binary files becomes harder. There are some anti-anti-debugging techniques proposed so far, but malware developers make dynamic analysis difficult using vari...
متن کاملPoster: Automatically Evading Classifiers A Case Study on Structural Feature-based PDF Malware Classifiers
Machine learning methods are widely used in security tasks. However, the robustness of these models against motivated adversaries is unclear. In this work, we propose a generic method that simulates evasion attempts to evaluate the robustness of classifiers under attack. We report results from experiments automatically generating malware variants to evade classifiers, from which we have observe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Neural Computing and Applications
سال: 2022
ISSN: ['0941-0643', '1433-3058']
DOI: https://doi.org/10.1007/s00521-022-07096-6