Abstract
In this paper, we propose two defense methods against adversarial attack to a malware detection system for mobile multimedia applications in IoT environments. They are Robust-NN and a combination of convolutional neural network and 1- nearest neighbors(C4N) which modify training data that has been poisoned by an adversarial attack. As a result, the trained machine learning model will be accurate and if the malicious program is entered by any IoT device, the model generates necessary alerts. We provide an explanation of the used attack method and the algorithms proposed to defend against this attack. In order to evaluate the suitability of the proposed defense methods, sufficient analysis is presented, i.e. Drebin, Contagio and Genome datasets which include benign and malware Android apps are applied to perform experiments. To confirm the effectiveness of the suggested defense algorithms, this paper compared their performance with two state-of-the-art defense algorithms used to detect adversarial samples, namely e2SAD and EAT. The experiments are performed on two types of API and Permission features from the mentioned datasets. The results confirm that accuracy rates of classification algorithms decrease to 40% after attack in some cases (related to Drebin dataset by reviewing API feature sets). Additionally, the accuracy rates increase to 94.94% and 96.03% by applying Robust-NN and C4N algorithms, respectively. Therefore, they are comparable with existing cutting-edge defense algorithms. Also, the adversarial attack increased the FPR to 45.81% which will be reduced to 4.84% and 4.15% using Robust-NN and C4N, respectively. Consequently, the proposed methods will be robust against adversarial attacks.
Similar content being viewed by others
References
Contagio dataset. http://contagiominidump.blogspot.com/ (2019). [Online; accessed 30-October-2019]
Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: Effective and explainable detection of android malware in your pocket. Ndss, vol 14. pp 23–26
Bazrafshan Z., Hashemi H., Fard S. M. H., Hamzeh A. (2013) A survey on heuristic malware detection techniques. In: The 5th conference on information and knowledge technology, IEEE, pp 113–120
Carrara F, Falchi F, Caldelli R, Amato G, Becarelli R (2019) Adversarial image detection in deep neural networks. Multimed Tools Appl 78(3):2815–2835
Chang TJ, He Y, Li P (2018) Efficient two-step adversarial defense for deep neural networks, arXiv:1810.03739
Chen X, Li C, Wang D, Wen S, Zhang J, Nepal S, Xiang Y, Ren K (2019) Android hiv: A study of repackaging malware for evading machine-learning detection. IEEE Transactions on Information Forensics and Security
Demetrio L, Biggio B, Lagorio G, Roli F, Armando A (2019) Explaining vulnerabilities of deep learning to adversarial malware binaries. arXiv:1901.03583
Dinakarrao SMP, Sayadi H, Makrani HM, Nowzari C, Rafatirad S, Homayoun H (2019) Lightweight node-level malware detection and network-level malware confinement in iot networks. In: 2019 Design, automation & test in europe conference & exhibition (DATE), IEEE, pp 776–781
Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in iot. J Syst Archit 97:1–7
Fan W, Sun G, Su Y, Liu Z, Lu X (2019) Integration of statistical detector and gaussian noise injection detector for adversarial example detection in deep neural networks. Multimed Tools Appl, pp. 1–21
Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572
Ham HS, Kim HH, Kim MS, Choi MJ (2014) Linear svm-based android malware detection for reliable iot services. J Appl Math, 2014
Hossain MM, Hasan R, Zawoad S (2018) Probe-iot: a public digital ledger based forensic investigation framework for iot. In: INFOCOM workshops, pp 1–2
Hu X, Chiueh Tc, Shin KG (2009) Large-scale malware indexing using function-call graphs. In: Proceedings of the 16th ACM conference on computer and communications security, pp 611–620. ACM
Jeong ES, Kim IS, Lee DH (2017) Safeguard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform. Multimed Tools Appl 76(17):18,153–18,173
Jiang X, Zhou Y (2012) Dissecting android malware: Characterization and evolution. In: Proc of IEEE S&P, pp 95–109
Karbab EB, Debbabi M, Derhab A, Mouheb D (2018) Maldozer: automatic framework for android malware detection using deep learning. Digit Investig 24:S48–S59
Lei T, Qin Z, Wang Z, Li Q, Ye D (2019) Evedroid: event-aware android malware detection against model degrading for iot devices. IEEE Internet of Things Journal
Liu X, Du X, Zhang X, Zhu Q, Wang H, Guizani M (2019) Adversarial samples on android malware detection systems for iot systems. Sensors 19(4):974
Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20(1):343–357
Shaerpour K, Dehghantanha A, Mahmod R (2013) Trends in android malware detection. Journal of Digital Forensics, Security and Law 8(3):2
Shen S, Huang L, Zhou H, Yu S, Fan E, Cao Q (2018) Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based iot networks. IEEE Internet of Things Journal 5(2):1043–1054
Su J, Vasconcellos VD, Prasad S, Daniele S, Feng Y, Sakurai K (2018) Lightweight classification of iot malware based on image recognition. In: 2018 IEEE 42Nd annual computer software and applications conference (COMPSAC), vol 2. IEEE, pp 664–669
Tramèr F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2017) Ensemble adversarial training: Attacks and defenses. arXiv:1705.07204
Wang Z (2018) Deep learning-based intrusion detection with adversaries. IEEE Access 6:38,367–38,384
Zhang M, Duan Y, Yin H, Zhao Z (2014) Semantics-aware android malware classification using weighted contextual api dependency graphs. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, ACM, pp 1105–1116
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
There is no any conflict of interest for the paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Taheri, R., Javidan, R. & Pooranian, Z. Adversarial android malware detection for mobile multimedia applications in IoT environments. Multimed Tools Appl 80, 16713–16729 (2021). https://doi.org/10.1007/s11042-020-08804-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08804-x