Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques

نویسندگان

چکیده

Abstract Recent progress in machine learning has led to promising results behavioral malware detection. Behavioral modeling identifies malicious processes via features derived by their runtime behavior. hold great promise as they are intrinsically related the functioning of each malware, and therefore considered difficult evade. Indeed, while a significant amount exists on evasion static features, dynamic seen limited work. This paper examines robustness ransomware detectors proposes multiple novel techniques evade them. Ransomware behavior differs significantly from that benign processes, making it an ideal best case for detectors, candidate evasion. We identify propose set attacks distribute overall workload across small independent, cooperating order avoid generation features. Our most effective attack decreases accuracy state-of-the-art classifier 98.6 0% using only 18 processes. Furthermore, we show our be against commercial black-box setting. Finally, evaluate detector designed attack, well discuss potential directions mitigate advanced attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers

Machine learning is widely used to develop classifiers for security tasks. However, the robustness of these methods against motivated adversaries is uncertain. In this work, we propose a generic method to evaluate the robustness of classifiers under attack. The key idea is to stochastically manipulate a malicious sample to find a variant that preserves the malicious behavior but is classified a...

متن کامل

Query Strategies for Evading Convex-Inducing Classifiers

Classifiers are often used to detect miscreant activities. We study how an adversary can systematically query a classifier to elicit information that allows the adversary to evade detection while incurring a near-minimal cost of modifying their intended malfeasance. We generalize the theory of Lowd and Meek (2005) to the family of convex-inducing classifiers that partition input space into two ...

متن کامل

Evading Machine Learning Malware Detection

Machine learning is a popular approach to signatureless malware detection because it can generalize to never-beforeseen malware families and polymorphic strains. This has resulted in its practical use for either primary detection engines or supplementary heuristic detections by anti-malware vendors. Recent work in adversarial machine learning has shown that models are susceptible to gradient-ba...

متن کامل

Evading Anti-debugging Techniques with Binary Substitution

Anti-debugging technology refers to various ways of preventing binary files from being analyzed in debuggers or other virtual machine environments. If binary files conceal or modify themself using anti-debugging techniques, analyzing these binary files becomes harder. There are some anti-anti-debugging techniques proposed so far, but malware developers make dynamic analysis difficult using vari...

متن کامل

Poster: Automatically Evading Classifiers A Case Study on Structural Feature-based PDF Malware Classifiers

Machine learning methods are widely used in security tasks. However, the robustness of these models against motivated adversaries is unclear. In this work, we propose a generic method that simulates evasion attempts to evaluate the robustness of classifiers under attack. We report results from experiments automatically generating malware variants to evade classifiers, from which we have observe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Neural Computing and Applications

سال: 2022

ISSN: ['0941-0643', '1433-3058']

DOI: https://doi.org/10.1007/s00521-022-07096-6