MDLDroid: Multimodal Deep Learning Based Android Malware Detection

被引:2
作者
Singh, Narendra [1 ]
Tripathy, Somanath [1 ]
机构
[1] Indian Inst Technol Patna, Dept Comp Sci & Engn, Dayalpur Daulatpur, India
来源
INFORMATION SYSTEMS SECURITY, ICISS 2023 | 2023年 / 14424卷
关键词
Android; Malware detection; Dynamic Analysis; System call; Dynamic API; COMPUTER; FEATURES;
D O I
10.1007/978-3-031-49099-6_10
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the era of Industry 5.0, there has been tremendous usage of android platforms in several handheld and mobile devices. The openness of the android platform makes it vulnerable for critical malware attacks. Meanwhile, there is also dramatic advancement in malware obfuscation and evading strategies. This leads to failure of traditional malware detection methods. Recently, machine learning techniques have shown promising outcome for malware detection. But past works utilizing machine learning algorithms suffer from several challenges such as inadequate feature extraction, dependency on hand-crafted features, and many more. Thus, existing machine learning approaches are inefficient in detecting sophisticated malware, thus require further enhancement. In this paper, we extract behavioural characteristics of system calls and dynamic API features using our proposed multimodal deep learning model (MDLDroid). Our model extracts system call features using LSTM layers and extracts dynamic API features using CNN. Further, both the features are fused in a vector space which is finally classified for benign and malign categories. Comparison with several state-of-the-art approaches on two dataset shows a significant improvement of 4-12% by the metric accuracy.
引用
收藏
页码:159 / 177
页数:19
相关论文
共 45 条
[1]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[2]   DL-Droid: Deep learning based android malware detection using real devices [J].
Alzaylaee, Mohammed K. ;
Yerima, Suleiman Y. ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 89
[3]  
[Anonymous], 2013, Adv. Neural Inf. Process. Syst.
[4]  
[Anonymous], 2018, Global smartphone shipments by OS 2016-2022
[5]   NTPDroid: A Hybrid Android Malware Detector using Network Traffic and System Permissions [J].
Arora, Anshul ;
Peddoju, Sateesh K. .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :808-813
[6]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[7]   IoT malware detection architecture using a novel channel boosted and squeezed CNN [J].
Asam, Muhammad ;
Khan, Saddam Hussain ;
Akbar, Altaf ;
Bibi, Sameena ;
Jamal, Tauseef ;
Khan, Asifullah ;
Ghafoor, Usman ;
Bhutta, Muhammad Raheel .
SCIENTIFIC REPORTS, 2022, 12 (01)
[8]   Mining Apps for Abnormal Usage of Sensitive Data [J].
Avdiienko, Vitalii ;
Kuznetsov, Konstantin ;
Gorla, Alessandra ;
Zeller, Andreas ;
Arzt, Steven ;
Rasthofer, Siegfried ;
Bodden, Eric .
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, :426-436
[9]  
cuthbertson Stephanie, android-google I/0 2019 keynote speech
[10]   A comparison of static, dynamic, and hybrid analysis for malware detection [J].
Damodaran A. ;
Troia F.D. ;
Visaggio C.A. ;
Austin T.H. ;
Stamp M. .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (1) :1-12