Optimizing AI for Mobile Malware Detection by Self-Built-Dataset GAN Oversampling and LGBM

被引:2
作者
Dayan, Ortal [1 ]
Wolf, Lior [1 ]
Wang, Fang [2 ]
Harel, Yaniv [3 ]
机构
[1] Tel Aviv Univ, Sch Comp Sci, Tel Aviv, Israel
[2] Khalifa Univ, C2PS, Dept Elect Engn & Comp Sci, Abu Dhabi, U Arab Emirates
[3] Tel Aviv Univ, Blavatnik Interdisciplinary Res Ctr, Tel Aviv, Israel
来源
2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR | 2023年
关键词
malware detection; cybersecurity; Sandbox; CupolaGAN; LightGBM; oversampling; ARTIFICIAL-INTELLIGENCE; THREATS;
D O I
10.1109/CSR57506.2023.10224927
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber detection industry focuses on analyzing the behavior of threats in order to develop IOCs and triggers. This process makes the detection always behind the attackers, as there is an analysis time between the attack tool launch and the detection ability. To address the challenges, a dedicated Sandbox environment was built, and thousands of mobile devices' samples were tested, resulted in creation of an up-to-date training dataset that is not based on the attacks analysis. With this dataset, the research focus was directed towards optimizing the AI methodology to achieve the best detection rates for a compromised mobile device. A CupolaGAN was implemented to oversample dataset and to compare results obtained from training LGBM models on both original imbalanced dataset and oversampled dataset. Classification scores on the oversampled data increase by maximum of 0.47+/-0.37%. The performance of the fine-tuned model using Optuna on the balanced data reaches 99.36+/-0.19% accuracy.
引用
收藏
页码:60 / 65
页数:6
相关论文
共 33 条
  • [1] Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
    Abdullahi, Mujaheed
    Baashar, Yahia
    Alhussian, Hitham
    Alwadain, Ayed
    Aziz, Norshakirah
    Capretz, Luiz Fernando
    Abdulkadir, Said Jadid
    [J]. ELECTRONICS, 2022, 11 (02)
  • [2] Optuna: A Next-generation Hyperparameter Optimization Framework
    Akiba, Takuya
    Sano, Shotaro
    Yanase, Toshihiko
    Ohta, Takeru
    Koyama, Masanori
    [J]. KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 2623 - 2631
  • [3] Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    [J]. SENSORS, 2022, 22 (06)
  • [4] Recent Advances in Android Mobile Malware Detection: A Systematic Literature Review
    Alzubaidi, Abdulaziz
    [J]. IEEE ACCESS, 2021, 9 : 146318 - 146349
  • [5] Aron L, 2015, 2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN)
  • [6] Arslan B, 2016, 2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), P7, DOI 10.1109/ISDFS.2016.7473509
  • [7] Fereidooni H, 2016, 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS)
  • [8] A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks
    Gupta, Chaitanya
    Johri, Ishita
    Srinivasan, Kathiravan
    Hu, Yuh-Chung
    Qaisar, Saeed Mian
    Huang, Kuo-Yi
    [J]. SENSORS, 2022, 22 (05)
  • [9] Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
    Hameed, Sufian
    Khan, Faraz Idris
    Hameed, Bilal
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2019, 2019
  • [10] Cyber Security and the Role of Intelligent Systems in Addressing its Challenges
    Harel, Yaniv
    Ben Gal, Irad
    Elovici, Yuval
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2017, 8 (04)