The rapid growth of the Internet of Things (IoT) devices is paralleled by them being on the front-line of malicious attacks. This has led to an explosion in the number of IoT malware, with continued mutations, evolution, and sophistication. These malicious software are detected using machine learning (ML) algorithms alongside the traditional signature-based methods. Although ML-based detectors improve the detection performance, they are susceptible to malware evolution and sophistication, making them limited to the patterns that they have been trained upon. This continuous trend motivates the large body of literature on malware analysis and detection research, with many systems emerging constantly, and outperforming their predecessors. In this work, we systematically examine the state-of-the-art malware detection approaches, that utilize various representation and learning techniques, under a range of adversarial settings. Our analyses highlight the instability of the proposed detectors in learning patterns that distinguish the benign from the malicious software. The results exhibit that software mutations with functionality-preserving operations, such as stripping and padding, significantly deteriorate the accuracy of such detectors. Additionally, our analysis of the industry-standard malware detectors shows their instability to the malware mutations.
翻译:虽然基于ML的检测器提高了检测性能,但它们容易出现错误软件的进化和复杂程度,并局限于所训练的模式。这种持续的趋势促使大量关于恶意软件分析和检测研究的文献不断涌现,并超过其前身。在这项工作中,我们系统地检查最先进的恶意软件检测方法,在一系列对抗环境下,利用各种代表和学习技术。我们的分析突出表明了拟议的检测器在区分良性与恶意软件的学习模式中的不稳定性。结果显示软件与功能保存操作发生突变,例如剥离和挂接,大大恶化了此类检测器的准确性。此外,我们对工业标准错误软件检测器的分析显示,这些检测器与磁性突变的不稳定性。