Efficient android malware identification with limited training data utilizing multiple convolution neural network techniques

被引:4
作者
Ksibi, Amel [1 ]
Zakariah, Mohammed [2 ]
Almuqren, Latifah [1 ]
Alluhaidan, Ala Saleh [1 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Transfer learning approach; Pre-trained model; Security; Android application package (APK); Android malware; Malware detection; MODEL;
D O I
10.1016/j.engappai.2023.107390
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has experienced phenomenal expansion over the past few years and has emerged as one of the most dynamic sectors of the international market. Android has become the driving force behind the rapid development of the IoT, and malware is one of the most severe concerns. Android is an open-source platform with a significant number of users. The identification of Android malware has become more critical in cybersecurity due to the meteoric rise of Android malware over the past few years and the severity of the damage it inflicts on smartphone users. Existing traditional Android malware detection methods based on machine learning have achieved encouraging performance. Still, the solution requires a massive workforce of feature engineering to build dynamic or static features and continuous learning through pre-extracted features to maintain high performance in identifying malware. Therefore, technologies for end-to-end malware detection without human interaction are necessary. In response to the rapid evolution of Android malware, a convolutional neural network that can acquire knowledge without requiring feature extraction is ideally suited. This paper offers a unique classification approach for malware based on a convolutional neural network, with feature extraction selected from the current pre-trained models DenseNet169, Xception, InceptionV3, ResNet50, and VGG16. The proposed methods have an advantage over existing detection methods due to their end-to-end learning process. Our suggested approaches convert Android APK files to binary codes and RGB images for usage as inputs to deep learning models. These models are trained and evaluated using the CICInvesAndMal2019 dataset, which consists of 333 benign and 428 malicious applications. Experiments demonstrate that the proposed approaches achieve a classification accuracy of 95.24%, 95.24%, and 95.83% for DenseNet169, InceptionV3, and VGG16, respectively, on a 761-sample dataset of malware, which is superior to other compared algorithms. Compared to previous methods, our suggested methods are more applicable to Android IoT devices since they do not require manual feature engineering and consume fewer resources.
引用
收藏
页数:11
相关论文
共 52 条
  • [1] Agrawal R., 2020, 2020 INT C EM TRENDS, P1
  • [2] Ahmed M., 2023, INT J INTELL NETW, V4, P11, DOI [10.1016/j.ijin.2022.11.005, DOI 10.1016/J.IJIN.2022.11.005]
  • [3] Alamro Hayam, 2023, Automated Android Malware Detection Using Optimal Ensemble Learning Approach for Cybersecurity
  • [4] Intelligent mobile malware detection using permission requests and API calls
    Alazab, Moutaz
    Alazab, Mamoun
    Shalaginov, Andrii
    Mesleh, Abdelwadood
    Awajan, Albara
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 509 - 521
  • [5] SURF: Speeded up robust features
    Bay, Herbert
    Tuytelaars, Tinne
    Van Gool, Luc
    [J]. COMPUTER VISION - ECCV 2006 , PT 1, PROCEEDINGS, 2006, 3951 : 404 - 417
  • [6] Bin Hui Tang, 2021, 2021 4th International Conference on Pattern Recognition and Artificial Intelligence (PRAI), P481, DOI 10.1109/PRAI53619.2021.9551073
  • [7] DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling
    Cai, Haipeng
    Meng, Na
    Ryder, Barbara
    Yao, Daphne
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) : 1455 - 1470
  • [8] Castillo C., 2011, Android malware: Past, present, and future
  • [9] Chen HJ, 2018, PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), P1358, DOI 10.1109/ITOEC.2018.8740537
  • [10] Xception: Deep Learning with Depthwise Separable Convolutions
    Chollet, Francois
    [J]. 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 1800 - 1807