Detecting Poisoning Attacks on Hierarchical Malware Classification Systems
Penn collection
General Robotics, Automation, Sensing and Perception Laboratory
Kod*lab
Degree type
Discipline
Subject
GRASP
poisoning attack
hierarchical clustering
hierarchical entropy measure
Electrical and Computer Engineering
Engineering
Systems Engineering
Funder
Grant number
License
Copyright date
Distributor
Related resources
https://repository.upenn.edu/cgi/viewcontent.cgi?filename=1&article=1811&context=ese_papers&type=additional
https://repository.upenn.edu/cgi/viewcontent.cgi?filename=2&article=1811&context=ese_papers&type=additional
https://repository.upenn.edu/cgi/viewcontent.cgi?filename=3&article=1811&context=ese_papers&type=additional
https://repository.upenn.edu/cgi/viewcontent.cgi?filename=4&article=1811&context=ese_papers&type=additional
https://repository.upenn.edu/cgi/viewcontent.cgi?filename=5&article=1811&context=ese_papers&type=additional
Contributor
Abstract
Anti-virus software based on unsupervised hierarchical clustering (HC) of malware samples has been shown to be vulnerable to poisoning attacks. In this kind of attack, a malicious player degrades anti-virus performance by submitting to the database samples specifically designed to collapse the classification hierarchy utilized by the anti-virus (and constructed through HC) or otherwise deform it in a way that would render it useless. Though each poisoning attack needs to be tailored to the particular HC scheme deployed, existing research seems to indicate that no particular HC method by itself is immune. We present results on applying a new notion of entropy for combinatorial dendrograms to the problem of controlling the influx of samples into the data base and deflecting poisoning attacks. In a nutshell, effective and tractable measures of change in hierarchy complexity are derived from the above, enabling on-the-fly flagging and rejection of potentially damaging samples. The information-theoretic underpinnings of these measures ensure their indifference to which particular poisoning algorithm is being used by the attacker, rendering them particularly attractive in this setting.