Abstract

Securing the Android gadgets from malware activities is a major concern in Internet of Things, and the drastic rise in adversarial attacks makes this problem more challenging. Existing Android adversarial techniques focus on the feature vector space manipulations through complex deep learning techniques, and the operational integrity is also not experimented. This work implements two evasion attack scenarios on the feature vector of Android apks and creates functionality preserved Android malware. The malware samples are injected with features that are absent in malicious samples, but found in legitimate applications. The sample thus formed will be identical in functionality, besides having statistical dissimilarity. One of the attack scenarios implemented is through feature similarity using Euclidean distance (ED), which measures between malware and benign samples. The other version of attack is by generating variants through particle swarm optimization (PSO). We find that our evasion algorithms are not highly biased nor complex, making them easier to train and understand compared to generative adversarial neural networks. The experiments were carried out on real-world Android applications from AndroZoo and AMD. We could successfully achieve the highest performance of 100% evasion rate with the PSO algorithm and 89.6% evasion rate with the ED algorithm with the lowest computational complexity compared to machine learning or deep learning mechanisms.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call