Netinfo Security ›› 2020, Vol. 20 ›› Issue (11): 51-58.doi: 10.3969/j.issn.1671-1122.2020.11.007

Previous Articles     Next Articles

Research on Mobile Malicious Adversarial Sample Generation Based on WGAN

LI Hongjiao, CHEN Hongyan()   

  1. School of Computer Science and Technology, Shanghai Electric Power University, Shanghai 201306, China
  • Received:2020-09-21 Online:2020-11-10 Published:2020-12-31
  • Contact: CHEN Hongyan E-mail:15000388434@163.com

Abstract:

In recent years, using machine learning algorithm to detect mobile terminal malware has become a research hotspot. In order to make the malware evade detection, malware producers use various methods to make malicious adversarial samples. This paper proposes an algorithm MalWGAN based on Wasserstein GAN (WGAN) to generate mobile terminal malicious adversarial samples, which can bypass the black box model detector based on machine learning algorithms to evade detection. Different from the existing adversarial samples generated by static gradient methods, the MalWGAN model combines API calls and static features to generate adversarial samples. Since adversarial samples are dynamically generated by the feedback of the black box model detector, the probability of escaping from the detection of the black box model detector is higher.

Key words: adversarial sample, WGAN, evasion of detection

CLC Number: