An Efficient Malware Detection Approach Based on Machine Learning Feature Influence Techniques for Resource-Constrained Devices

被引:0
|
作者
Panja, Subir [1 ,2 ]
Mondal, Subhash [1 ,3 ]
Nag, Amitava [1 ]
Singh, Jyoti Prakash [4 ]
Saikia, Manob Jyoti [5 ,6 ]
Barman, Anup Kumar [1 ]
机构
[1] Cent Inst Technol Kokrajhar, Dept Comp Sci & Engn, Kokrajhar 783370, Assam, India
[2] Acad Technol, Dept Comp Sci & Engn, Adisaptagram 712121, West Bengal, India
[3] Dayananda Sagar Univ, Dept Comp Sci & Engn AI & ML, Bengaluru 562112, Karnataka, India
[4] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, Bihar, India
[5] Univ Memphis, Elect & Comp Engn Dept, Memphis, TN 38152 USA
[6] Univ Memphis, Biomed Sensors & Syst Lab, Memphis, TN 38152 USA
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Malware; Accuracy; Feature extraction; Predictive models; Machine learning; Computer viruses; Overfitting; Computational modeling; Standards; Random forests; Malware detection; random forest classifier; feature selection; extra tree classifier; resource-constrained device; execution time;
D O I
10.1109/ACCESS.2025.3526878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing use of computer resources in modern society makes it extremely vulnerable to several cyber-attacks, including unauthorized access to equipment and computer systems' manipulation or utter breakdown. Malicious attacks in the form of malware cause significant harm to systems with limited resources. Hence, detecting these attacks and promptly implementing a computationally efficient technique is imperative. Utilizing a machine learning (ML) based model is a superior option for promptly identifying malware. This study develops fourteen machine learning models using a five-fold cross-validation technique on the dataset it obtained for research. We compute the execution time and memory used for each of the fourteen ML model developments, considering both all features and the reduced features after applying the data preprocessing methods. We utilized the Extra Tree classifier (ETC) to identify the top ten significant contributing features based on Gini impurity scores, which led to improved accuracy and reduced processing time. After that, we compared the experimental results and found that the Random Forest (RF) classification model on the reduced features set had a prediction accuracy of 99.39% and ROC-AUC values of 0.99. The ETC model prediction yields comparable results, confirming the viability of the suggested model. The proposed model is very resilient, exhibiting an extremely small standard deviation. It is also highly responsive, with reduced execution time and memory utilization.
引用
收藏
页码:12647 / 12665
页数:19
相关论文
共 50 条
  • [41] A review of detecting malware in android devices based on machine learning techniques
    Sharma, Monika
    Kaul, Ajay
    EXPERT SYSTEMS, 2024, 41 (01)
  • [42] Efficient Online Classification and Tracking on Resource-constrained IoT Devices
    Aftab, Muhammad
    Chau, Sid Chi-Kin
    Shenoy, Prashant
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2020, 1 (03):
  • [43] Efficient Wind Speed Forecasting for Resource-Constrained Sensor Devices
    Herreria-Alonso, Sergio
    Suarez-Gonzalez, Andres
    Rodriguez-Perez, Miguel
    Rodriguez-Rubio, Raul F.
    Lopez-Garcia, Candido
    SENSORS, 2021, 21 (03) : 1 - 17
  • [44] Optimizing Reinforcement Learning-Based Visual Navigation for Resource-Constrained Devices
    Vijetha, U.
    Geetha, V.
    IEEE ACCESS, 2023, 11 : 125648 - 125663
  • [45] An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices
    Wu, Xin-Wen
    Farag, Waleed
    Ali, Sanwar
    Kulkarni, Siddhivinayak
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 679 - 685
  • [46] Macro Malware Detection using Machine Learning Techniques A New Approach
    De los Santos, Sergio
    Torres, Jose
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 295 - 302
  • [47] Deep Active Audio Feature Learning in Resource-Constrained Environments
    Mohaimenuzzaman, Md
    Bergmeir, Christoph
    Meyer, Bernd
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2024, 32 : 3224 - 3237
  • [48] Predicting Solar-Harvested Energy for Resource-Constrained IoT Devices Using Machine Learning
    Khamitov, Rakhat
    Orel, Daniil
    Zorbas, Dimitrios
    2024 20TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SMART SYSTEMS AND THE INTERNET OF THINGS, DCOSS-IOT 2024, 2024, : 661 - 668
  • [49] Demo: Privacy-Preserving Decentralized Machine Learning Framework for Clustered Resource-Constrained Devices
    Hidayat, Muhammad Ayat
    Nakamura, Yugo
    Arakawa, Yutaka
    PROCEEDINGS OF THE 2024 THE 22ND ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS AND SERVICES, MOBISYS 2024, 2024, : 612 - 613
  • [50] PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detection
    Mahindru, Arvind
    Arora, Himani
    Kumar, Abhinav
    Gupta, Sachin Kumar
    Mahajan, Shubham
    Kadry, Seifedine
    Kim, Jungeun
    SCIENTIFIC REPORTS, 2024, 14 (01):