DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms

被引:30
作者
Bakir, Halit [1 ]
Bakir, Rezan [1 ]
机构
[1] Sivas Univ Sci & Technol, Fac Engn & Nat Sci, Comp Engn Dept, Sivas, Turkiye
关键词
Auto encoder; Malware detection; Android application; Code analysis; HYBRID ANALYSIS; EFFICIENT; ENSEMBLE;
D O I
10.1016/j.compeleceng.2023.108804
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Android Malware detection became a hot topic over the last several years. Although considerable studies have been conducted utilizing machine learning-based methods, little attention has been dedicated to the feature extraction importance which considers an essential factor when using machine learning methods. Thus, in this study, we proposed a new feature extraction method based on the auto-encoder structure. Particularly, we propose DroidEncoder, a novel autoencoder-based model to classify Android malware applications. On the grounds of this, an image-based Android app dataset composed of 3000 malicious apps and 3000 benign apps is constructed. Then, three different auto-encoders, namely ANN-based auto-encoder, CNN-based auto-encoder, and VGG19-based auto-encoder have been proposed to extract features from the visualized Malware dataset. Three different experiments were conducted for extracting features in order to train multiple machine learning algorithms, such as decision tree, extra tree, k-nearest neighbors, LightGBM, XGBoost, Random forest, linear regression, and support vector machine. Furthermore, cross-validation alongside multiple metrics was used for evaluating the performance of the proposed models. According to the obtained results, the proposed method approved its affectivity with superior performance in terms of all metrics.
引用
收藏
页数:18
相关论文
共 71 条
[1]   Empirical assessment of machine learning-based malware detectors for Android Measuring the gap between in-the-lab and in-the-wild validation scenarios [J].
Allix, Kevin ;
Bissyande, Tegawende F. ;
Jerome, Quentin ;
Klein, Jacques ;
State, Radu ;
Le Traon, Yves .
EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (01) :183-211
[2]   Graph-based malware detection using dynamic analysis [J].
Anderson, Blake ;
Quist, Daniel ;
Neil, Joshua ;
Storlie, Curtis ;
Lane, Terran .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04) :247-258
[3]  
[Anonymous], 2022, 2022 SonicWall Cyber Threat Report
[4]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[5]  
Arzt Steven., 2015, Proceedings of the 4th ACM SIGPLAN International Workshop on State of the Art in Program Analysis, P1, DOI DOI 10.1145/2771284.2771285
[6]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95
[7]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[8]   DeepVisDroid: android malware detection by hybridizing image-based features with deep learning techniques [J].
Bakour, Khaled ;
Unver, Halil Murat .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (18) :11499-11516
[9]   VisDroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques [J].
Bakour, Khaled ;
Unver, Halil Murat .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (08) :3133-3153
[10]   The Android malware detection systems between hope and reality [J].
Bakour, Khaled ;
Unver, Halil Murat ;
Ghanem, Razan .
SN APPLIED SCIENCES, 2019, 1 (09)