DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms

被引:27
作者
Bakir, Halit [1 ]
Bakir, Rezan [1 ]
机构
[1] Sivas Univ Sci & Technol, Fac Engn & Nat Sci, Comp Engn Dept, Sivas, Turkiye
关键词
Auto encoder; Malware detection; Android application; Code analysis; HYBRID ANALYSIS; EFFICIENT; ENSEMBLE;
D O I
10.1016/j.compeleceng.2023.108804
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Android Malware detection became a hot topic over the last several years. Although considerable studies have been conducted utilizing machine learning-based methods, little attention has been dedicated to the feature extraction importance which considers an essential factor when using machine learning methods. Thus, in this study, we proposed a new feature extraction method based on the auto-encoder structure. Particularly, we propose DroidEncoder, a novel autoencoder-based model to classify Android malware applications. On the grounds of this, an image-based Android app dataset composed of 3000 malicious apps and 3000 benign apps is constructed. Then, three different auto-encoders, namely ANN-based auto-encoder, CNN-based auto-encoder, and VGG19-based auto-encoder have been proposed to extract features from the visualized Malware dataset. Three different experiments were conducted for extracting features in order to train multiple machine learning algorithms, such as decision tree, extra tree, k-nearest neighbors, LightGBM, XGBoost, Random forest, linear regression, and support vector machine. Furthermore, cross-validation alongside multiple metrics was used for evaluating the performance of the proposed models. According to the obtained results, the proposed method approved its affectivity with superior performance in terms of all metrics.
引用
收藏
页数:18
相关论文
共 71 条
  • [1] Empirical assessment of machine learning-based malware detectors for Android Measuring the gap between in-the-lab and in-the-wild validation scenarios
    Allix, Kevin
    Bissyande, Tegawende F.
    Jerome, Quentin
    Klein, Jacques
    State, Radu
    Le Traon, Yves
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (01) : 183 - 211
  • [2] Graph-based malware detection using dynamic analysis
    Anderson, Blake
    Quist, Daniel
    Neil, Joshua
    Storlie, Curtis
    Lane, Terran
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 247 - 258
  • [3] [Anonymous], 2022, 2022 SonicWall Cyber Threat Report
  • [4] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [5] Arzt Steven., 2015, Proceedings of the 4th ACM SIGPLAN International Workshop on State of the Art in Program Analysis, P1, DOI DOI 10.1145/2771284.2771285
  • [6] Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
    Azmoodeh, Amin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01): : 88 - 95
  • [7] Detecting crypto-ransomware in IoT networks based on energy consumption footprint
    Azmoodeh, Amin
    Dehghantanha, Ali
    Conti, Mauro
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1141 - 1152
  • [8] DeepVisDroid: android malware detection by hybridizing image-based features with deep learning techniques
    Bakour, Khaled
    Unver, Halil Murat
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (18) : 11499 - 11516
  • [9] VisDroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques
    Bakour, Khaled
    Unver, Halil Murat
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (08) : 3133 - 3153
  • [10] The Android malware detection systems between hope and reality
    Bakour, Khaled
    Unver, Halil Murat
    Ghanem, Razan
    [J]. SN APPLIED SCIENCES, 2019, 1 (09):