An Efficient Malware Detection Approach Based on Machine Learning Feature Influence Techniques for Resource-Constrained Devices

被引:0
|
作者
Panja, Subir [1 ,2 ]
Mondal, Subhash [1 ,3 ]
Nag, Amitava [1 ]
Singh, Jyoti Prakash [4 ]
Saikia, Manob Jyoti [5 ,6 ]
Barman, Anup Kumar [1 ]
机构
[1] Cent Inst Technol Kokrajhar, Dept Comp Sci & Engn, Kokrajhar 783370, Assam, India
[2] Acad Technol, Dept Comp Sci & Engn, Adisaptagram 712121, West Bengal, India
[3] Dayananda Sagar Univ, Dept Comp Sci & Engn AI & ML, Bengaluru 562112, Karnataka, India
[4] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, Bihar, India
[5] Univ Memphis, Elect & Comp Engn Dept, Memphis, TN 38152 USA
[6] Univ Memphis, Biomed Sensors & Syst Lab, Memphis, TN 38152 USA
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Malware; Accuracy; Feature extraction; Predictive models; Machine learning; Computer viruses; Overfitting; Computational modeling; Standards; Random forests; Malware detection; random forest classifier; feature selection; extra tree classifier; resource-constrained device; execution time;
D O I
10.1109/ACCESS.2025.3526878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing use of computer resources in modern society makes it extremely vulnerable to several cyber-attacks, including unauthorized access to equipment and computer systems' manipulation or utter breakdown. Malicious attacks in the form of malware cause significant harm to systems with limited resources. Hence, detecting these attacks and promptly implementing a computationally efficient technique is imperative. Utilizing a machine learning (ML) based model is a superior option for promptly identifying malware. This study develops fourteen machine learning models using a five-fold cross-validation technique on the dataset it obtained for research. We compute the execution time and memory used for each of the fourteen ML model developments, considering both all features and the reduced features after applying the data preprocessing methods. We utilized the Extra Tree classifier (ETC) to identify the top ten significant contributing features based on Gini impurity scores, which led to improved accuracy and reduced processing time. After that, we compared the experimental results and found that the Random Forest (RF) classification model on the reduced features set had a prediction accuracy of 99.39% and ROC-AUC values of 0.99. The ETC model prediction yields comparable results, confirming the viability of the suggested model. The proposed model is very resilient, exhibiting an extremely small standard deviation. It is also highly responsive, with reduced execution time and memory utilization.
引用
收藏
页码:12647 / 12665
页数:19
相关论文
共 50 条
  • [31] Compact feature hashing for machine learning based malware detection
    Moon, Damin
    Lee, JaeKoo
    Yoon, MyungKeun
    ICT EXPRESS, 2022, 8 (01): : 124 - 129
  • [32] A Survey on Federated Learning for Resource-Constrained IoT Devices
    Imteaj, Ahmed
    Thakker, Urmish
    Wang, Shiqiang
    Li, Jian
    Amini, M. Hadi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 1 - 24
  • [33] Influence of learning in resource-constrained project scheduling
    Van Peteghem, Vincent
    Vanhoucke, Mario
    COMPUTERS & INDUSTRIAL ENGINEERING, 2015, 87 : 569 - 579
  • [34] Efficient knowledge management for heterogeneous federated continual learning on resource-constrained edge devices
    Yang, Zhao
    Zhang, Shengbing
    Li, Chuxi
    Wang, Miao
    Wang, Haoyang
    Zhang, Meng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 156 : 16 - 29
  • [35] Efficient deep learning architectures for fast identification of bacterial strains in resource-constrained devices
    Gallardo Garcia, Rafael
    Jarquin Rodriguez, Sofia
    Beltran Martinez, Beatriz
    Hernandez Gracidas, Carlos
    Martinez Torres, Rodolfo
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) : 39915 - 39944
  • [36] The application of machine learning models in a resource-constrained environment
    Heffernan, Addison M.
    Shin, Jaewook
    Otoki, Kemunto
    Parker, Robert K.
    Heffernan, Daithi S.
    IRISH JOURNAL OF MEDICAL SCIENCE, 2025,
  • [37] Efficient deep learning architectures for fast identification of bacterial strains in resource-constrained devices
    Rafael Gallardo García
    Sofía Jarquín Rodríguez
    Beatriz Beltrán Martínez
    Carlos Hernández Gracidas
    Rodolfo Martínez Torres
    Multimedia Tools and Applications, 2022, 81 : 39915 - 39944
  • [38] ESFL: Efficient Split Federated Learning Over Resource-Constrained Heterogeneous Wireless Devices
    Zhu, Guangyu
    Deng, Yiqin
    Chen, Xianhao
    Zhang, Haixia
    Fang, Yuguang
    Wong, Tan F.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 27153 - 27166
  • [39] Enabling Machine Learning on Resource-constrained Tactical Networks
    Perazzone, Jake
    Dwyer, Matthew
    Chan, Kevin
    Anderson, Cleon
    Brown, Scott
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [40] Resource-Constrained Machine Learning for ADAS: A Systematic Review
    Borrego-Carazo, Juan
    Castells-Rufas, David
    Biempica, Ernesto
    Carrabina, Jordi
    IEEE ACCESS, 2020, 8 : 40573 - 40598