Efficient android malware identification with limited training data utilizing multiple convolution neural network techniques

被引:4
作者
Ksibi, Amel [1 ]
Zakariah, Mohammed [2 ]
Almuqren, Latifah [1 ]
Alluhaidan, Ala Saleh [1 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Transfer learning approach; Pre-trained model; Security; Android application package (APK); Android malware; Malware detection; MODEL;
D O I
10.1016/j.engappai.2023.107390
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has experienced phenomenal expansion over the past few years and has emerged as one of the most dynamic sectors of the international market. Android has become the driving force behind the rapid development of the IoT, and malware is one of the most severe concerns. Android is an open-source platform with a significant number of users. The identification of Android malware has become more critical in cybersecurity due to the meteoric rise of Android malware over the past few years and the severity of the damage it inflicts on smartphone users. Existing traditional Android malware detection methods based on machine learning have achieved encouraging performance. Still, the solution requires a massive workforce of feature engineering to build dynamic or static features and continuous learning through pre-extracted features to maintain high performance in identifying malware. Therefore, technologies for end-to-end malware detection without human interaction are necessary. In response to the rapid evolution of Android malware, a convolutional neural network that can acquire knowledge without requiring feature extraction is ideally suited. This paper offers a unique classification approach for malware based on a convolutional neural network, with feature extraction selected from the current pre-trained models DenseNet169, Xception, InceptionV3, ResNet50, and VGG16. The proposed methods have an advantage over existing detection methods due to their end-to-end learning process. Our suggested approaches convert Android APK files to binary codes and RGB images for usage as inputs to deep learning models. These models are trained and evaluated using the CICInvesAndMal2019 dataset, which consists of 333 benign and 428 malicious applications. Experiments demonstrate that the proposed approaches achieve a classification accuracy of 95.24%, 95.24%, and 95.83% for DenseNet169, InceptionV3, and VGG16, respectively, on a 761-sample dataset of malware, which is superior to other compared algorithms. Compared to previous methods, our suggested methods are more applicable to Android IoT devices since they do not require manual feature engineering and consume fewer resources.
引用
收藏
页数:11
相关论文
共 52 条
  • [41] Vidas Timothy, 2014, P 9 ACM S INF COMP C, P447, DOI [10.1145/2590296.2590325, DOI 10.1145/2590296.2590325]
  • [42] Android Malware Detection Based on Machine Learning
    Wang, Qing-Fei
    Fang, Xiang
    [J]. 2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 434 - 436
  • [43] Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges
    Yaqoob, Ibrar
    Hashem, Ibrahim Abaker Targio
    Ahmed, Arif
    Kazmi, S. M. Ahsan
    Hong, Choong Seon
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 265 - 275
  • [44] An Android mutation malware detection based on deep learning using visualization of importance from codes
    Yen, Yao-Saint
    Sun, Hung-Min
    [J]. MICROELECTRONICS RELIABILITY, 2019, 93 : 109 - 114
  • [45] Analysis of Bayesian classification-based approaches for Android malware detection
    Yerima, Suleiman Y.
    Sezer, Sakir
    McWilliams, Gavin
    [J]. IET INFORMATION SECURITY, 2014, 8 (01) : 25 - 36
  • [46] Yin Minn Pa Pa, 2015, 9 USENIX WORKSH OFF
  • [47] Yuan ZL, 2014, SIGCOMM'14: PROCEEDINGS OF THE 2014 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, P371, DOI [10.1145/2619239.2631434, 10.1145/2740070.2631434]
  • [48] Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs
    Zhang, Mu
    Duan, Yue
    Yin, Heng
    Zhao, Zhiruo
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1105 - 1116
  • [49] Android Malware Detection Using TCN with Bytecode Image
    Zhang, Wenhui
    Luktarhan, Nurbol
    Ding, Chao
    Lu, Bei
    [J]. SYMMETRY-BASEL, 2021, 13 (07):
  • [50] MalCaps: A Capsule Network Based Model for the Malware Classification
    Zhang, Xiaoliang
    Wu, Kehe
    Chen, Zuge
    Zhang, Chenyi
    [J]. PROCESSES, 2021, 9 (06)