An Efficient Malware Detection Approach Based on Machine Learning Feature Influence Techniques for Resource-Constrained Devices

被引:0
|
作者
Panja, Subir [1 ,2 ]
Mondal, Subhash [1 ,3 ]
Nag, Amitava [1 ]
Singh, Jyoti Prakash [4 ]
Saikia, Manob Jyoti [5 ,6 ]
Barman, Anup Kumar [1 ]
机构
[1] Cent Inst Technol Kokrajhar, Dept Comp Sci & Engn, Kokrajhar 783370, Assam, India
[2] Acad Technol, Dept Comp Sci & Engn, Adisaptagram 712121, West Bengal, India
[3] Dayananda Sagar Univ, Dept Comp Sci & Engn AI & ML, Bengaluru 562112, Karnataka, India
[4] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, Bihar, India
[5] Univ Memphis, Elect & Comp Engn Dept, Memphis, TN 38152 USA
[6] Univ Memphis, Biomed Sensors & Syst Lab, Memphis, TN 38152 USA
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Malware; Accuracy; Feature extraction; Predictive models; Machine learning; Computer viruses; Overfitting; Computational modeling; Standards; Random forests; Malware detection; random forest classifier; feature selection; extra tree classifier; resource-constrained device; execution time;
D O I
10.1109/ACCESS.2025.3526878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing use of computer resources in modern society makes it extremely vulnerable to several cyber-attacks, including unauthorized access to equipment and computer systems' manipulation or utter breakdown. Malicious attacks in the form of malware cause significant harm to systems with limited resources. Hence, detecting these attacks and promptly implementing a computationally efficient technique is imperative. Utilizing a machine learning (ML) based model is a superior option for promptly identifying malware. This study develops fourteen machine learning models using a five-fold cross-validation technique on the dataset it obtained for research. We compute the execution time and memory used for each of the fourteen ML model developments, considering both all features and the reduced features after applying the data preprocessing methods. We utilized the Extra Tree classifier (ETC) to identify the top ten significant contributing features based on Gini impurity scores, which led to improved accuracy and reduced processing time. After that, we compared the experimental results and found that the Random Forest (RF) classification model on the reduced features set had a prediction accuracy of 99.39% and ROC-AUC values of 0.99. The ETC model prediction yields comparable results, confirming the viability of the suggested model. The proposed model is very resilient, exhibiting an extremely small standard deviation. It is also highly responsive, with reduced execution time and memory utilization.
引用
收藏
页码:12647 / 12665
页数:19
相关论文
共 50 条
  • [1] Sleep Apnea Detection System Using Machine Learning on Resource-Constrained Devices
    Mallick, Sayani
    Gawali, Shubhangi
    Onime, Clement
    Goveas, Neena
    2023 IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON, 2023,
  • [2] Efficient Pattern Detection in Extremely Resource-Constrained Devices
    Zoumboulakis, Michael
    Roussos, George
    2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 10 - +
  • [3] Addressing Catastrophic Forgetting in Federated Learning on Resource-Constrained Devices: A Feature Replay Approach
    Gao, Zhipeng
    Zhang, Junyao
    Yu, Xinlei
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT V, ICIC 2024, 2024, 14879 : 336 - 348
  • [4] Runtime Classification of Mobile Malware for Resource-Constrained Devices
    Milosevic, Jelena
    Malek, Miroslaw
    Ferrante, Alberto
    E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 195 - 215
  • [5] Efficient federated learning on resource-constrained edge devices based on model pruning
    Wu, Tingting
    Song, Chunhe
    Zeng, Peng
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (06) : 6999 - 7013
  • [6] A Graph-Based Feature Generation Approach in Android Malware Detection with Machine Learning Techniques
    Liu, Xiaojian
    Lei, Qian
    Liu, Kehong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020 (2020)
  • [7] Efficient federated learning on resource-constrained edge devices based on model pruning
    Tingting Wu
    Chunhe Song
    Peng Zeng
    Complex & Intelligent Systems, 2023, 9 : 6999 - 7013
  • [8] A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
    Yilmaz, Selim
    Aydogan, Emre
    Sen, Sevil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4405 - 4418
  • [9] An Effective Approach for Resource-Constrained Edge Devices in Federated Learning
    Wen, Jun
    Li, Xiusheng
    Chen, Yupeng
    Li, Xiaoli
    Mao, Hang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2024, 2024
  • [10] Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications
    Shafin, Sakib Shahriar
    Karmakar, Gour
    Mareels, Iven
    SENSORS, 2023, 23 (11)