Malware Detection and Classification on Different Dataset by Hybridization of CNN and Machine Learning

Authors

  • S. Arshad Hashmi Department of Information Systems, Faculty of Computing, and Information Technology in Rabigh (FCITR), King Abdulaziz University, Jeddah, 21911, Saudi Arabia

Keywords:

Android, Cybersecurity, Deep learning, Malware, Machine learnings Optimization, Weighted Features

Abstract

Malware has long been employed in cyberattacks. Due to their widespread usage, malicious software developers target Android smartphones, which may store a lot of sensitive data. As the main mobile OS, Android has always attracted malware developers. Thus, several Android malware species target susceptible people everyday, making manual malware analysis unfeasible. ML and DL methods for malware identification and categorization might help cyber forensic investigators curb the spread of malicious software. Applying DL methods helps safeguard applications. Cybersecurity issues including intrusion detection, malware classification and identification, phishing and spam detection, and spam recognition have been addressed using DL approaches. ECNN uses the BP (Back Propagation) model for every layer between several intermediate layers, making it faster and more accurate than other methods. SVM Learning with Weighted Features and CNN with SGD optimization for static analysis of mobile apps are presented in this research. The ECNN model has the highest accuracy of 96.92, 96.14, and 95.8 for Android Malware Dataset-1, 2, and 3. On the three datasets, the ECNN model has 96%, 94%, and 94% precision. Smartphone malware analysis is faster and more accurate using this method.

Downloads

Download data is not yet available.

References

S. K. Sasidharan and C. Thomas, “Prodroid-an an droid malware detection framework based on profile hid- den markov model,” Pervasive and Mobile Computing, vol. 72, pp. 101 336–101 336, 2021.

L. N. Vu and S. Jung, “Admat: A cnn-on-matrix approach to android malware detection and classification,” IEEE Access, vol. 9, pp. 39–680, 2021.

Thakkar, A.; Lohiya, R. A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges; Springer: Dordrecht, The Netherlands, 2021; Volume 28, pp. 3211–3243. [CrossRef] 10.1007/s11831-020-09496-0

Gowdhaman, V.; Dhanapal, R. An intrusion detection system for wireless sensor networks using deep neural network. Soft Comput. 2021, 26, 13059–13067. 10.1007/s00500-021-06473-y

Liu, K.; Xu, S.; Xu, G.; Zhang, M.; Sun, D.; Liu, H. A review of android malware detection approaches based on machine learning. IEEE Access 2020, 8, 124579–124607. 10.1109/ACCESS.2020.3006143

Bovenzi, G.; Persico, V.; Pescapé, A.; Piscitelli, A.; Spadari, V. Hierarchical Classification of Android Malware Traffic. In Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 9–11 December 2022; pp. 1354–1359. 10.1109/TrustCom56396.2022.00191

D. O. S¸ahın, S. Akleylek, and E. Kili¸c, “Linregdroid: Detection of android malware us- ing multiple linear re- gression models-based classifiers,” IEEE Access, vol. 10, pp. 14–246, 2022.

Y. Hei, R. Yang, H. Peng, L. Wang, X. Xu, J. Liu, H. Liu, J. Xu, and L. Sun, “Hawk: Rapid android malware detection through heterogeneous graph attention networks,” IEEE Transactions on Neural Networks and Learning Systems, 2021.

S. S. Vanjire and M. Lakshmi, “Mdta: A new approach of supervised machine learning for android malware detection and threat attribution using behavioral reports,” Mobile Computing and Sustainable Informatics, pp. 147– 159, 2022.

Karbab, E.M.B.; Debbabi, M.; Derhab, A.; Mouheb, D. MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 2018, 24, S48–S59. 10.1016/j.diin.2018.01.007

S.Y. Yerima, S. Khan, Longitudinal performance analysis of machine learning based Android malware detectors, in: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, 2019, pp. 1–8.

J. Garcia, M. Hammad, S. Malek, Lightweight, obfuscation-resilient detection and family identification of android malware, ACM Trans. Software Eng. Methodol. 26 (3) (2018) 1–29

K.G. Kumar, Efficient android malware scanner using hybrid analysis, Int. J. Recent Technol. Eng. 7 (2019) 76–80

D. Teubert, J. Krude, S. Schueppen, U. Meyer, Hugin: a scalable hybrid android malware detection system, in: SECURWARE 2017: the Eleventh International Conference on Emerging Security Information, Systems and Technologies, 2017, pp. 168–176.

N. Daoudi, J. Samhi, A. K. Kabore, K. Allix, T. F. B. e, and J. Klein, “Dexray: A simple, yet effective deep learning approach to android malware detection based on image representation of bytecode,” International Work- shop on Deployable Machine Learning

H.Bai, N. Xie, X. Di, and Q. Ye, “Famd: A fast mul- tifeature android malware detection framework, design and implementation,” IEEE Access, vol. 8, pp. 194–729, 2020

A. Mehtab, W. B. Shahid, T. Yaqoob, M. F. Amjad, H. Abbas, H. Afzal, and M. N. Saqib, “Addroid: rule- based machine learning framework for android malware analysis,” Mobile Networks and Applications, vol. 25, no. 1, pp. 180–192, 2020.

L. Cai, Y. Li, Z. Xiong, and Jowmdroid, “Android mal- ware detection based on feature weighting with joint op- timization of weight-mapping and classifier parameters,” Computers & Security, vol. 100, pp. 102 086–102 086, 2021.

S. I. Imtiaz, S. U. Rehman, A. R. Javed, Z. Jalil, X. Liu, and W. S. Alnumay, “Deepamd: Detection and identi- fication of android malware using high-efficient deep artificial neural network,” Future Generation computer systems, vol. 115, pp. 844–856, 2021.

W. Zhang, H. Wang, H. He, and P. Liu, “Damba: detect- ing android malware by orgb analysis,” IEEE Transac- tions on Reliability, vol. 69, no. 1, pp. 55–69, 2020.

H. Gao, S. Cheng, and W. Zhang, “Gdroid: Android malware detection and classification with graph convo- lutional network,” Computers & Security, vol. 106, pp. 102 264–102 264, 2021.

A. Guerra-Manzanares, H. Bahsi, and S. N. omm, “Kron-odroid Time-based hybrid- featured dataset for effective android malware detection and characterization,” Com- puters & Security, vol. 110, pp. 102 399–102 399, 2021.

Y. Ban, S. Lee, D. Song, H. Cho, and J. H. Yi, “Fam: Featuring android malware for deep learning-based fa- milial analysis,” IEEE Access, vol. 10, pp. 20–28, 2022.

H. Cai and B. G. Ryder, “Droidfax: A toolkit for system- atic characterization of android applications,” 2017 IEEE International Conference on Software Maintenance and Evo- lution (ICSME), pp. 643–647, 2017.

E. Mariconti, L. Onwuzurike, P. Andriotis, E. D. Cristo- faro, G. Ross, G. Stringh-Ini, and . . Mamadroid, 2016.

K. Xu, Y. Li, R. Deng, K. Chen, and J. Xu, “Droide- volver: Self-evolving android mal- ware detection sys- tem,” 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 47–62, 2019.

W. Li, X. Fu, and H. Cai, “Androct: Ten years of app call traces in android,” 2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR), pp. 570–574, 2021.

N. R. Surendran, T. Thomas, and S. Emmanuel, “Gsdroid: Graph signal based compact feature representation for android malware detection,” Expert Systems with Appli- cations, vol. 159, pp. 113 581–113 581,2020.

E. B. Karbab and M. Debbabi, “Petadroid: Adaptive android malware detection using deep learning,” In- ternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 319–340, 2021.

Zhao, X.; Fang, J.; Wang, X. Android malware detection based on permissions. In Proceedings of the ICICT 2014, Nanjing, China, 2 October 2014. 10.1049/cp.2014.0605

Emanuelsson, P.; Nilsson, U. A comparative study of industrial static analysis tools. Electron. Notes Theor. Comput. Sci. 2008, 217, 5–21. 10.1016/j.entcs.2008.06.039

15. Wang, W.; Zhao, M.; Wang, J. Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J. Ambient. Intell. Humaniz. Comput. 2019, 10, 3035–3043. 10.1007/s12652-018-0803-6

Raymer, M.L.; Punch, W.F.; Goodman, E.D.; Kuhn Leslie, A.; Jain, A.K. Dimensionality reduction using genetic algorithms. IEEE Trans. Evol. Comput. 2000, 4, 164–171. 10.1109/4235.850656

Bhattacharya, A.; Goswami, R.T.; Mukherjee, K. A feature selection technique based on rough set and improvised PSO algorithm (PSORS-FS) for permission based detection of Android malwares. Int. J. Mach. Learn. Cybern. 2018, 10, 1893–1907. 10.1007/s13042-018-0838-1

Han, J.C., Sanchez, R., Hu, X.H.,: Feature Selection Based on Relative Attribute Dependency: An Experimental Study. RSFDGrC’05, I, LNAI. 3641 (2005) 214-223.

Hu, K., Lu, Y., Shi, C.: Feature Ranking in Rough Sets. AI Communications. 16 (2003) 41-50

Yao, J.T., Zhang, M.: Feature Selection with Adjustable Criteria. RSFDGrC’05, I, LNAI. 3641 (2005) 204–213.

Boiy, M.-F. Moens, A machine learning approach to sentiment analysis in multilingual web texts. Information retrieval 12(5), 526–558 (2009)

Ö. Aslan and A. A. Yilmaz, "A New Malware Classification Framework Based on Deep Learning Algorithms," in IEEE Access, vol. 9, pp. 87936-87951, 2021, doi: 10.1109/ACCESS.2021.3089586

Downloads

Published

30.11.2023

How to Cite

Hashmi , S. A. . (2023). Malware Detection and Classification on Different Dataset by Hybridization of CNN and Machine Learning. International Journal of Intelligent Systems and Applications in Engineering, 12(6s), 650–667. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4004

Issue

Section

Research Article