[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Adversarial android malware detection for mobile multimedia applications in IoT environments

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose two defense methods against adversarial attack to a malware detection system for mobile multimedia applications in IoT environments. They are Robust-NN and a combination of convolutional neural network and 1- nearest neighbors(C4N) which modify training data that has been poisoned by an adversarial attack. As a result, the trained machine learning model will be accurate and if the malicious program is entered by any IoT device, the model generates necessary alerts. We provide an explanation of the used attack method and the algorithms proposed to defend against this attack. In order to evaluate the suitability of the proposed defense methods, sufficient analysis is presented, i.e. Drebin, Contagio and Genome datasets which include benign and malware Android apps are applied to perform experiments. To confirm the effectiveness of the suggested defense algorithms, this paper compared their performance with two state-of-the-art defense algorithms used to detect adversarial samples, namely e2SAD and EAT. The experiments are performed on two types of API and Permission features from the mentioned datasets. The results confirm that accuracy rates of classification algorithms decrease to 40% after attack in some cases (related to Drebin dataset by reviewing API feature sets). Additionally, the accuracy rates increase to 94.94% and 96.03% by applying Robust-NN and C4N algorithms, respectively. Therefore, they are comparable with existing cutting-edge defense algorithms. Also, the adversarial attack increased the FPR to 45.81% which will be reduced to 4.84% and 4.15% using Robust-NN and C4N, respectively. Consequently, the proposed methods will be robust against adversarial attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Contagio dataset. http://contagiominidump.blogspot.com/ (2019). [Online; accessed 30-October-2019]

  2. Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: Effective and explainable detection of android malware in your pocket. Ndss, vol 14. pp 23–26

  3. Bazrafshan Z., Hashemi H., Fard S. M. H., Hamzeh A. (2013) A survey on heuristic malware detection techniques. In: The 5th conference on information and knowledge technology, IEEE, pp 113–120

  4. Carrara F, Falchi F, Caldelli R, Amato G, Becarelli R (2019) Adversarial image detection in deep neural networks. Multimed Tools Appl 78(3):2815–2835

    Article  Google Scholar 

  5. Chang TJ, He Y, Li P (2018) Efficient two-step adversarial defense for deep neural networks, arXiv:1810.03739

  6. Chen X, Li C, Wang D, Wen S, Zhang J, Nepal S, Xiang Y, Ren K (2019) Android hiv: A study of repackaging malware for evading machine-learning detection. IEEE Transactions on Information Forensics and Security

  7. Demetrio L, Biggio B, Lagorio G, Roli F, Armando A (2019) Explaining vulnerabilities of deep learning to adversarial malware binaries. arXiv:1901.03583

  8. Dinakarrao SMP, Sayadi H, Makrani HM, Nowzari C, Rafatirad S, Homayoun H (2019) Lightweight node-level malware detection and network-level malware confinement in iot networks. In: 2019 Design, automation & test in europe conference & exhibition (DATE), IEEE, pp 776–781

  9. Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in iot. J Syst Archit 97:1–7

    Article  Google Scholar 

  10. Fan W, Sun G, Su Y, Liu Z, Lu X (2019) Integration of statistical detector and gaussian noise injection detector for adversarial example detection in deep neural networks. Multimed Tools Appl, pp. 1–21

  11. Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572

  12. Ham HS, Kim HH, Kim MS, Choi MJ (2014) Linear svm-based android malware detection for reliable iot services. J Appl Math, 2014

  13. Hossain MM, Hasan R, Zawoad S (2018) Probe-iot: a public digital ledger based forensic investigation framework for iot. In: INFOCOM workshops, pp 1–2

  14. Hu X, Chiueh Tc, Shin KG (2009) Large-scale malware indexing using function-call graphs. In: Proceedings of the 16th ACM conference on computer and communications security, pp 611–620. ACM

  15. Jeong ES, Kim IS, Lee DH (2017) Safeguard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform. Multimed Tools Appl 76(17):18,153–18,173

    Article  Google Scholar 

  16. Jiang X, Zhou Y (2012) Dissecting android malware: Characterization and evolution. In: Proc of IEEE S&P, pp 95–109

  17. Karbab EB, Debbabi M, Derhab A, Mouheb D (2018) Maldozer: automatic framework for android malware detection using deep learning. Digit Investig 24:S48–S59

    Article  Google Scholar 

  18. Lei T, Qin Z, Wang Z, Li Q, Ye D (2019) Evedroid: event-aware android malware detection against model degrading for iot devices. IEEE Internet of Things Journal

  19. Liu X, Du X, Zhang X, Zhu Q, Wang H, Guizani M (2019) Adversarial samples on android malware detection systems for iot systems. Sensors 19(4):974

    Article  Google Scholar 

  20. Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20(1):343–357

    Article  Google Scholar 

  21. Shaerpour K, Dehghantanha A, Mahmod R (2013) Trends in android malware detection. Journal of Digital Forensics, Security and Law 8(3):2

    Google Scholar 

  22. Shen S, Huang L, Zhou H, Yu S, Fan E, Cao Q (2018) Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based iot networks. IEEE Internet of Things Journal 5(2):1043–1054

    Article  Google Scholar 

  23. Su J, Vasconcellos VD, Prasad S, Daniele S, Feng Y, Sakurai K (2018) Lightweight classification of iot malware based on image recognition. In: 2018 IEEE 42Nd annual computer software and applications conference (COMPSAC), vol 2. IEEE, pp 664–669

  24. Tramèr F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2017) Ensemble adversarial training: Attacks and defenses. arXiv:1705.07204

  25. Wang Z (2018) Deep learning-based intrusion detection with adversaries. IEEE Access 6:38,367–38,384

    Article  Google Scholar 

  26. Zhang M, Duan Y, Yin H, Zhao Z (2014) Semantics-aware android malware classification using weighted contextual api dependency graphs. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, ACM, pp 1105–1116

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reza Javidan.

Ethics declarations

Conflict of interests

There is no any conflict of interest for the paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Taheri, R., Javidan, R. & Pooranian, Z. Adversarial android malware detection for mobile multimedia applications in IoT environments. Multimed Tools Appl 80, 16713–16729 (2021). https://doi.org/10.1007/s11042-020-08804-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08804-x

Keywords

Navigation