2020
DOI: 10.1007/s00521-020-04831-9
|View full text |Cite|
|
Sign up to set email alerts
|

On defending against label flipping attacks on malware detection systems

Abstract: Label manipulation attacks are a subclass of data poisoning attacks in adversarial machine learning used against different applications, such as malware detection. These types of attacks represent a serious threat to detection systems in environments having high noise rate or uncertainty, such as complex networks and Internet of Thing (IoT). Recent work in the literature has suggested using the K-Nearest Neighboring (KNN) algorithm to defend against such attacks. However, such an approach can suffer from low t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 73 publications
(43 citation statements)
references
References 24 publications
(33 reference statements)
0
30
0
Order By: Relevance
“…They also have write access. Although they cannot change the label (as in label flipping [91]) or modify the features of existing training samples, they are allowed to inject new samples in the training dataset. The adversary also knows the features used by the detector -which correspond to the features representing the samples of the training dataset.…”
Section: Case Studiesmentioning
confidence: 99%
“…They also have write access. Although they cannot change the label (as in label flipping [91]) or modify the features of existing training samples, they are allowed to inject new samples in the training dataset. The adversary also knows the features used by the detector -which correspond to the features representing the samples of the training dataset.…”
Section: Case Studiesmentioning
confidence: 99%
“…Reactive countermeasures are only able to detect adversarial behaviour after the neural network has been built and deployed. Reactive countermeasures could be input reconstruction, and data sanitation, which could be performed using multiple classifier systems or statistical analysis [21,38]. Yuan et al propose re-training to be a proactive countermeasure against adversaries, as adversarial training could prepare a model in an improved manner [16].…”
Section: Related Workmentioning
confidence: 99%
“…is gives rise to an alternative static analysis method that uses multiple static features to detect malware. For this purpose, the executable application (APK) is reverse engineered from which relevant features are extracted for analysis and detection, such as API [11][12][13], permission [14,15], intents [16], function call graph [17,18], and control follow [19]. Arora et al [20] proposed a novel detection model, called PermPair, which detects malware by mining the combination of permissions from the AndroidManifest.xml on applications.…”
Section: Related Workmentioning
confidence: 99%