期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
N-gram MalGAN:Evading machine learning detection via feature n-gram
1
作者 Enmin Zhu Jianjie Zhang +2 位作者 Jijie Yan Kongyang Chen Chongzhi Gao 《Digital Communications and Networks》 SCIE CSCD 2022年第4期485-491,共7页
In recent years,many adversarial malware examples with different feature strategies,especially GAN and its variants,have been introduced to handle the security threats,e.g.,evading the detection of machine learning de... In recent years,many adversarial malware examples with different feature strategies,especially GAN and its variants,have been introduced to handle the security threats,e.g.,evading the detection of machine learning detectors.However,these solutions still suffer from problems of complicated deployment or long running time.In this paper,we propose an n-gram MalGAN method to solve these problems.We borrow the idea of n-gram from the Natural Language Processing(NLP)area to expand feature sources for adversarial malware examples in MalGAN.Generally,the n-gram MalGAN obtains the feature vector directly from the hexadecimal bytecodes of the executable file.It can be implemented easily and conveniently with a simple program language(e.g.,C++),with no need for any prior knowledge of the executable file or any professional feature extraction tools.These features are functionally independent and thus can be added to the non-functional area of the malicious program to maintain its original executability.In this way,the n-gram could make the adversarial attack easier and more convenient.Experimental results show that the evasion rate of the n-gram MalGAN is at least 88.58%to attack different machine learning algorithms under an appropriate group rate,growing to even 100%for the Random Forest algorithm. 展开更多
关键词 Machine learning N-GRAM malgan Adversarial examples
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部