DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms

被引:27
作者
Bakir, Halit [1 ]
Bakir, Rezan [1 ]
机构
[1] Sivas Univ Sci & Technol, Fac Engn & Nat Sci, Comp Engn Dept, Sivas, Turkiye
关键词
Auto encoder; Malware detection; Android application; Code analysis; HYBRID ANALYSIS; EFFICIENT; ENSEMBLE;
D O I
10.1016/j.compeleceng.2023.108804
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Android Malware detection became a hot topic over the last several years. Although considerable studies have been conducted utilizing machine learning-based methods, little attention has been dedicated to the feature extraction importance which considers an essential factor when using machine learning methods. Thus, in this study, we proposed a new feature extraction method based on the auto-encoder structure. Particularly, we propose DroidEncoder, a novel autoencoder-based model to classify Android malware applications. On the grounds of this, an image-based Android app dataset composed of 3000 malicious apps and 3000 benign apps is constructed. Then, three different auto-encoders, namely ANN-based auto-encoder, CNN-based auto-encoder, and VGG19-based auto-encoder have been proposed to extract features from the visualized Malware dataset. Three different experiments were conducted for extracting features in order to train multiple machine learning algorithms, such as decision tree, extra tree, k-nearest neighbors, LightGBM, XGBoost, Random forest, linear regression, and support vector machine. Furthermore, cross-validation alongside multiple metrics was used for evaluating the performance of the proposed models. According to the obtained results, the proposed method approved its affectivity with superior performance in terms of all metrics.
引用
收藏
页数:18
相关论文
共 71 条
  • [21] Android malware detection method based on bytecode image
    Ding, Yuxin
    Zhang, Xiao
    Hu, Jieke
    Xu, Wenting
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 14 (5) : 6401 - 6410
  • [22] HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
    Eskandari, Mojtaba
    Khorshidpour, Zeinab
    Hashemi, Sattar
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (02): : 77 - 93
  • [23] Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis
    Fan, Ming
    Liu, Jun
    Luo, Xiapu
    Chen, Kai
    Tian, Zhenzhou
    Zheng, Qinghua
    Liu, Ting
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) : 1890 - 1905
  • [24] AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Suarez-Tangil, Guillermo
    Furnell, Steven
    [J]. COMPUTERS & SECURITY, 2017, 65 : 121 - 134
  • [25] A Novel Dynamic Android Malware Detection System With Ensemble Learning
    Feng, Pengbin
    Ma, Jianfeng
    Sun, Cong
    Xu, Xinpeng
    Ma, Yuwan
    [J]. IEEE ACCESS, 2018, 6 : 30996 - 31011
  • [26] Fu Song, 2012, FM 2012: Formal Methods. Proceedings of the 18th International Symposium, P418, DOI 10.1007/978-3-642-32759-9_34
  • [27] Gallingani D, 2015, MOST
  • [28] Griffin K, 2009, LECT NOTES COMPUT SC, V5758, P101, DOI 10.1007/978-3-642-04342-0_6
  • [29] Classification of malware based on integrated static and dynamic features
    Islam, Rafiqul
    Tian, Ronghua
    Batten, Lynn M.
    Versteeg, Steve
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 646 - 656
  • [30] Isohara T., 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P1011, DOI 10.1109/CIS.2011.226