A Novel Feature Encoding Scheme for Machine Learning Based Malware Detection Systems

被引:0
作者
Das, Vipin [1 ]
Nair, Binoy B. [2 ]
Thiruvengadathan, Rajagopalan [3 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Artificial Intelligence, Coimbatore 641112, India
[2] Amrita Vishwa Vidyapeetham, Dept Elect & Commun Engn, Amrita Sch Engn, Coimbatore 641112, India
[3] Southern Utah Univ, Dept Engn & Technol, Cedar City, UT 84720 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Malware; Codes; Encoding; Machine learning; Feature extraction; Grippers; Static analysis; Computer security; Intrusion detection; Classification algorithms; Detection algorithms; Cybersecurity; categorical encoding; intrusion detection; machine learning; malware classification; malware detection; NETWORK INTRUSION DETECTION; UNSW-NB15 DATA SET; IOT; ALGORITHM; MECHANISM; INTERNET; TAXONOMY; THINGS; SELECTION; DEFENSE;
D O I
10.1109/ACCESS.2024.3420080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection is an ever-evolving area given that the strides in the detection capabilities being matched by radical attempts to bypass the detection. As the sophistication of malware continues to increase, the demand for innovative approaches to improve detection capabilities become paramount. Machine learning/Deep learning models are being increasingly used for Malware Detection, however one of the most important and frequently overlooked aspects of building such models is feature encoding. This research paper explores the importance of feature encoding to improve the efficiency of threat detection and proposes a novel entropy-based encoding scheme for the categorical features present in the data extracted from malicious inputs. The KDDCUP99, UNSW-NB15 and CIC-Evasive-PDFMal2022 datasets have been used to evaluate the effectiveness of the proposed encoding scheme. The results of the proposed encoding scheme are validated against seven other encoding schemes to ascertain the credibility and usability of the proposed scheme. The efficiency of the proposed system evaluated by applying different encoded versions of the datasets to train various machine learning models and determining the classification performance of the models on each dataset. The machine learning models trained with the proposed encoding scheme produced stable classification results and outperformed other encoding schemes when dimensionality reduction was applied on the data. The ensemble classifier trained using the proposed scheme was able to classify the data with an F1 score of 99.99% when the dimension-reduced entropy-encoded KDD Cup99 dataset was used to build the model. On the CIC-Evasive-PDFMal2022 dataset, the entropy encoding has exhibited a slightly improved classification parameters with the ensemble methods yielding a peak F1 score of 99.27%. We have also determined the feature importance values of the features present in the datasets to study the change in the contribution levels of the features when multiple categorical encoding schemes are applied upon the data.
引用
收藏
页码:91187 / 91216
页数:30
相关论文
共 104 条
  • [11] Arp D, 2021, Arxiv, DOI arXiv:2010.09470
  • [12] A Comprehensive Review on Malware Detection Approaches
    Aslan, Omer
    Samet, Refik
    [J]. IEEE ACCESS, 2020, 8 : 6249 - 6271
  • [13] Belouch M, 2017, INT J ADV COMPUT SC, V8, P389
  • [14] Belous V., 2020, Computer viruses, malicious logic, andspyware,'' inViruses, Hardware and Software Trojans, P101, DOI [10.1007/978-3-030-47218-42.4J, DOI 10.1007/978-3-030-47218-42.4J]
  • [15] Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03): : 1701 - 1714
  • [16] Principal component analysis
    Bro, Rasmus
    Smilde, Age K.
    [J]. ANALYTICAL METHODS, 2014, 6 (09) : 2812 - 2831
  • [17] A Deep Learning-Based Intrusion Detection and Preventation System for Detecting and Preventing Denial-of-Service Attacks
    Canola Garcia, Juan Fernando
    Taborda Blandon, Gabriel Enrique
    [J]. IEEE ACCESS, 2022, 10 : 83043 - 83060
  • [18] Towards a taxonomy of intrusion-detection systems
    Debar, H
    Dacier, M
    Wespi, A
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 805 - 822
  • [19] Minimum redundancy feature selection from microarray gene expression data
    Ding, C
    Peng, HC
    [J]. PROCEEDINGS OF THE 2003 IEEE BIOINFORMATICS CONFERENCE, 2003, : 523 - 528
  • [20] Divekar A, 2018, PROCEEDINGS ON 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), P1, DOI 10.1109/CCCS.2018.8586840