GAResNet: A Transfer Learning based Framework for Android Malware Detection

被引:0
作者
Shen, Rui [1 ]
Zhu, Hui-juan [1 ]
Li, Chang [1 ]
Wei, Hua-hui [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Jiangsu, Peoples R China
来源
2023 IEEE INTERNATIONAL CONFERENCE ON KNOWLEDGE GRAPH, ICKG | 2023年
关键词
Android; malware detection; machine learning; transfer learning;
D O I
10.1109/ICKG59574.2023.00038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing and widespread presence of malicious software (malware), especially targeting the Android platform, have brought unprecedented challenges to user privacy security. Numerous machine learning-based malware detection methods have been proposed. However, many of these approaches may not be effective due to the time-consuming process of training new models and the constant evolution of Android malware. This becomes particularly challenging when dealing with new variants of malware within a limited sample size. To address this challenge, drawing inspiration from abundant malware samples and extensive research on other platforms, we propose an Android malware detection framework GAResNet (ResNet with Group Convolution and Attention) leveraging transfer learning. Moreover, to extract more efficient and discriminative feature to further boost the malware detection capability for new malware, we integrate group convolution and attention mechanisms into the original residual network model. More precisely, our model trains on the Microsoft dataset and migrates to the Android dataset. The experimental results demonstrate that our proposed method achieves an accuracy of 88.46% with just one round of training when migrating to the target domain. After fine-tuning, the accuracy further improves to 96.20%, outperforming state-of-the-art detection approaches. These results highlight the effectiveness and superiority of our approach in the field of Android malware detection.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 32 条
  • [1] Ahmed M., 2023, Int. J. Intell. Netw., V4, P11, DOI [10.1016/j.ijin.2022.11.005, DOI 10.1016/J.IJIN.2022.11.005]
  • [2] [Anonymous], 2022, Received
  • [3] [Anonymous], Microsoft Malware Classification Challenge (BIG 2015)
  • [4] Bhodia N, 2019, Arxiv, DOI arXiv:1903.11551
  • [5] JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters
    Cai, Lingru
    Li, Yao
    Xiong, Zhi
    [J]. COMPUTERS & SECURITY, 2021, 100
  • [6] Chen L, 2018, Arxiv, DOI arXiv:1812.07606
  • [7] DEXRAY: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
    Daoudi, Nadia
    Samhi, Jordan
    Kabore, Abdoul Kader
    Allix, Kevin
    Bissyande, Tegawende F.
    Klein, Jacques
    [J]. DEPLOYABLE MACHINE LEARNING FOR SECURITY DEFENSE, MLHAT 2021, 2021, 1482 : 81 - 106
  • [8] Visualization and deep-learning-based malware variant detection using OpCode-level features
    Darem, Abdulbasit
    Abawajy, Jemal
    Makkar, Aaisha
    Alhashmi, Asma
    Alanazi, Sultan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 314 - 323
  • [9] Farahani A., 2021, Advances in data science and information engineering, P877, DOI [10.1007/978-3-030-71704-965, DOI 10.1007/978-3-030-71704-9_65]
  • [10] GDroid: Android malware detection and classification with graph convolutional network
    Gao, Han
    Cheng, Shaoyin
    Zhang, Weiming
    [J]. COMPUTERS & SECURITY, 2021, 106