A Novel Feature Encoding Scheme for Machine Learning Based Malware Detection Systems

被引:0
作者
Das, Vipin [1 ]
Nair, Binoy B. [2 ]
Thiruvengadathan, Rajagopalan [3 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Artificial Intelligence, Coimbatore 641112, India
[2] Amrita Vishwa Vidyapeetham, Dept Elect & Commun Engn, Amrita Sch Engn, Coimbatore 641112, India
[3] Southern Utah Univ, Dept Engn & Technol, Cedar City, UT 84720 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Malware; Codes; Encoding; Machine learning; Feature extraction; Grippers; Static analysis; Computer security; Intrusion detection; Classification algorithms; Detection algorithms; Cybersecurity; categorical encoding; intrusion detection; machine learning; malware classification; malware detection; NETWORK INTRUSION DETECTION; UNSW-NB15 DATA SET; IOT; ALGORITHM; MECHANISM; INTERNET; TAXONOMY; THINGS; SELECTION; DEFENSE;
D O I
10.1109/ACCESS.2024.3420080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection is an ever-evolving area given that the strides in the detection capabilities being matched by radical attempts to bypass the detection. As the sophistication of malware continues to increase, the demand for innovative approaches to improve detection capabilities become paramount. Machine learning/Deep learning models are being increasingly used for Malware Detection, however one of the most important and frequently overlooked aspects of building such models is feature encoding. This research paper explores the importance of feature encoding to improve the efficiency of threat detection and proposes a novel entropy-based encoding scheme for the categorical features present in the data extracted from malicious inputs. The KDDCUP99, UNSW-NB15 and CIC-Evasive-PDFMal2022 datasets have been used to evaluate the effectiveness of the proposed encoding scheme. The results of the proposed encoding scheme are validated against seven other encoding schemes to ascertain the credibility and usability of the proposed scheme. The efficiency of the proposed system evaluated by applying different encoded versions of the datasets to train various machine learning models and determining the classification performance of the models on each dataset. The machine learning models trained with the proposed encoding scheme produced stable classification results and outperformed other encoding schemes when dimensionality reduction was applied on the data. The ensemble classifier trained using the proposed scheme was able to classify the data with an F1 score of 99.99% when the dimension-reduced entropy-encoded KDD Cup99 dataset was used to build the model. On the CIC-Evasive-PDFMal2022 dataset, the entropy encoding has exhibited a slightly improved classification parameters with the ensemble methods yielding a peak F1 score of 99.27%. We have also determined the feature importance values of the features present in the datasets to study the change in the contribution levels of the features when multiple categorical encoding schemes are applied upon the data.
引用
收藏
页码:91187 / 91216
页数:30
相关论文
共 104 条
  • [1] Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm
    Abd Elaziz, Mohamed
    Al-qaness, Mohammed A. A.
    Dahou, Abdelghani
    Ibrahim, Rehab Ali
    Abd El-Latif, Ahmed A.
    [J]. ADVANCES IN ENGINEERING SOFTWARE, 2023, 176
  • [2] BotChase: Graph-Based Bot Detection Using Machine Learning
    Abou Daya, Abbas
    Salahuddin, Mohammad A.
    Limam, Noura
    Boutaba, Raouf
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 15 - 29
  • [3] PDF Malware Detection Based on Optimizable Decision Trees
    Abu Al-Haija, Qasem
    Odeh, Ammar
    Qattous, Hazem
    [J]. ELECTRONICS, 2022, 11 (19)
  • [4] Afreen A., 2020, 2020 INT C CYBER WAR, P1, DOI [DOI 10.1109/ICCWS48432.2020.9292376, 10.1109/ICCWS48432.2020, DOI 10.1109/ICCWS48432.2020]
  • [5] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [6] Botnet Detection Approach Using Graph-Based Machine Learning
    Alharbi, Afnan
    Alsubhi, Khalid
    [J]. IEEE ACCESS, 2021, 9 (09): : 99166 - 99180
  • [7] Alharthi A., 2020, P 4 INT C FUT NETW D, P1, DOI [10.1145/3440749.3442637, DOI 10.1145/3440749.3442637]
  • [8] Andalib A, 2020, Arxiv, DOI arXiv:2007.05922
  • [9] [Anonymous], 2001, ACM SIGKDD explorations newsletter, DOI DOI 10.1145/507533.507538
  • [10] [Anonymous], 2001, P IEEE WORKSH INF AS