基于DQN生成对抗样本的JavaScript恶意代码检测模型

A JAVASCRIPT MALICIOUS CODE DETECTION MODEL BASED ON DQN GENERATION OF ADVERSARIAL SAMPLES

  • 摘要: 针对基于深度学习的JavaScript恶意代码检测模型抗攻击能力较弱的问题,提出一个基于DQN(Deep Q-Learning Network)生成对抗样本的JavaScript恶意代码检测组合模型DQN-CNN。利用CNN对数据集进行训练,得到初始判别器origin_CNN。将DQN作为生成器,两者组成DQN-origin_CNN对抗模型进行训练。在训练过程中DQN通过代码混淆动作,生成origin_CNN的对抗样本。接着将对抗样本加入数据集,对origin_CNN持续进行迭代训练,获得最终判别器retrain_CNN。实验结果表明,retrain_CNN与DQN组成新的对抗模型DQN-retrain_CNN生成对抗样本成功率显著下降,从45.7%下降为21.5%,证明最终生成的判别器retrain_CNN的抗攻击能力得到了显著提升。

     

    Abstract: To address the problem that JavaScript malicious code detection models based on deep learning are weak against attacks, a combined model DQN-CNN for JavaScript malicious code detection based on DQN generation of adversarial samples is proposed.The initial discriminator origin_CNN was obtained by training the dataset with CNN. The DQN was used as a generator and the two formed a DQN-origin_CNN adversarial model for training. During the training process, DQN generated the adversarial samples of origin_CNN by code obfuscation actions. The adversarial samples were added to the dataset, and the origin_CNN was continuously trained iteratively to obtain the final discriminator retrain_CNN. The experimental results show that the success rate of generating adversarial samples for the new JP2adversarial model DQN-retrain_CNN composed of retrain_CNN and DQN decreases significantly, from 45.7% to 21.5%, proving that the final generated discriminator retrain_CNN has significantly improved its resistance to attacks.

     

/

返回文章
返回