Android Malware Detection: Leveraging Deep Learning with Process Control Block Information

被引:0
|
作者
Alawneh, Heba [1 ]
Alkofahi, Hamza [1 ]
Umphress, David [2 ]
机构
[1] Jordan Univ Sci & Technol, Irbid, Jordan
[2] Auburn Univ, Auburn, AL 36849 USA
来源
DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 21ST INTERNATIONAL CONFERENCE | 2025年 / 1259卷
关键词
Dynamic Malware Detection; Deep Learning; Process Control Block mining; kernel-level monitoring;
D O I
10.1007/978-3-031-82073-1_13
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security and privacy of Android device users are seriously threatened by the sophistication and endurance of malware. The risks associated with malware assaults on Android are larger than ever since mobile devices are being utilized for sensitive transactions and data storage more and more. This paper proposes a dynamic malware detection system that mines data from Process Control Blocks (PCBs) during process execution to identify malicious activity using deep learning techniques. Our method provides robust detection of various threats by examining processes at this fundamental level. It precisely monitors changes in PCB parameters for all application threads functioning at the kernel level, in contrast to user-level malware detection. Our PCB mining approach outperforms existing methods in accuracy and scalability of captured PCB records. Our testing findings revealed a high success rate, capturing over 99 percent of context transitions. Utilizing a manageable sequence size of 12 PCBs, our deep learning detection model successfully identified malicious activity at various points in the process execution, achieving an accuracy of 95.6%.
引用
收藏
页码:129 / 138
页数:10
相关论文
共 50 条
  • [1] Process control block information dataset: Towards android malware detection
    Alawneh, Heba
    Alkofahi, Hamza
    DATA IN BRIEF, 2024, 57
  • [2] Utilizing obfuscation information in deep learning-based Android malware detection
    Wu, Junji
    Kanai, Atsushi
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 1321 - 1326
  • [3] Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review
    Smmarwar, Santosh K.
    Gupta, Govind P.
    Kumar, Sanjay
    TELEMATICS AND INFORMATICS REPORTS, 2024, 14
  • [4] An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources
    Wajahat, Ahsan
    He, Jingsha
    Zhu, Nafei
    Mahmood, Tariq
    Nazir, Ahsan
    Ullah, Faheem
    Qureshi, Sirajuddin
    Osman, Musa
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (01): : 33 - 55
  • [5] A Deep Learning Approach to Android Malware Feature Learning and Detection
    Su, Xin
    Zhang, Dafang
    Li, Wenjia
    Zhao, Kai
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 244 - 251
  • [6] Review of Android Malware Detection Based on Deep Learning
    Wang, Zhiqiang
    Liu, Qian
    Chi, Yaping
    IEEE ACCESS, 2020, 8 : 181102 - 181126
  • [7] Deep learning feature exploration for Android malware detection
    Zhang, Nan
    Tan, Yu-an
    Yang, Chen
    Li, Yuanzhang
    APPLIED SOFT COMPUTING, 2021, 102
  • [8] Applying deep learning techniques for Android malware detection
    Zegzhda, Peter
    Zegzhda, Dmitry
    Pavlenko, Evgeny
    Ignatev, Gleb
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [9] Tuning Deep Learning Performance for Android Malware Detection
    Booz, Jarrett
    McGiff, Josh
    Hatcher, William G.
    Yu, Wei
    Nguyen, James
    Lu, Chao
    2018 19TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2018, : 140 - 145
  • [10] Deep Android Malware Detection
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Kang, BooJoong
    Yerima, Suleiman
    Miller, Paul
    Sezer, Sakir
    Safaei, Yeganeh
    Trickel, Erik
    Zhao, Ziming
    Doup, Adam
    Ahn, Gail Joon
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 301 - 308