DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms

被引:30
作者
Bakir, Halit [1 ]
Bakir, Rezan [1 ]
机构
[1] Sivas Univ Sci & Technol, Fac Engn & Nat Sci, Comp Engn Dept, Sivas, Turkiye
关键词
Auto encoder; Malware detection; Android application; Code analysis; HYBRID ANALYSIS; EFFICIENT; ENSEMBLE;
D O I
10.1016/j.compeleceng.2023.108804
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Android Malware detection became a hot topic over the last several years. Although considerable studies have been conducted utilizing machine learning-based methods, little attention has been dedicated to the feature extraction importance which considers an essential factor when using machine learning methods. Thus, in this study, we proposed a new feature extraction method based on the auto-encoder structure. Particularly, we propose DroidEncoder, a novel autoencoder-based model to classify Android malware applications. On the grounds of this, an image-based Android app dataset composed of 3000 malicious apps and 3000 benign apps is constructed. Then, three different auto-encoders, namely ANN-based auto-encoder, CNN-based auto-encoder, and VGG19-based auto-encoder have been proposed to extract features from the visualized Malware dataset. Three different experiments were conducted for extracting features in order to train multiple machine learning algorithms, such as decision tree, extra tree, k-nearest neighbors, LightGBM, XGBoost, Random forest, linear regression, and support vector machine. Furthermore, cross-validation alongside multiple metrics was used for evaluating the performance of the proposed models. According to the obtained results, the proposed method approved its affectivity with superior performance in terms of all metrics.
引用
收藏
页数:18
相关论文
共 71 条
[21]   Android malware detection method based on bytecode image [J].
Ding, Yuxin ;
Zhang, Xiao ;
Hu, Jieke ;
Xu, Wenting .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 14 (5) :6401-6410
[22]   HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection [J].
Eskandari, Mojtaba ;
Khorshidpour, Zeinab ;
Hashemi, Sattar .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (02) :77-93
[23]   Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis [J].
Fan, Ming ;
Liu, Jun ;
Luo, Xiapu ;
Chen, Kai ;
Tian, Zhenzhou ;
Zheng, Qinghua ;
Liu, Ting .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) :1890-1905
[24]   AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection [J].
Feizollah, Ali ;
Anuar, Nor Badrul ;
Salleh, Rosli ;
Suarez-Tangil, Guillermo ;
Furnell, Steven .
COMPUTERS & SECURITY, 2017, 65 :121-134
[25]   A Novel Dynamic Android Malware Detection System With Ensemble Learning [J].
Feng, Pengbin ;
Ma, Jianfeng ;
Sun, Cong ;
Xu, Xinpeng ;
Ma, Yuwan .
IEEE ACCESS, 2018, 6 :30996-31011
[26]  
Fu Song, 2012, FM 2012: Formal Methods. Proceedings of the 18th International Symposium, P418, DOI 10.1007/978-3-642-32759-9_34
[27]  
Gallingani D, 2015, MOST
[28]  
Griffin K, 2009, LECT NOTES COMPUT SC, V5758, P101, DOI 10.1007/978-3-642-04342-0_6
[29]  
Huang WY, 2016, LECT NOTES COMPUT SC, V9721, P399, DOI 10.1007/978-3-319-40667-1_20
[30]   Classification of malware based on integrated static and dynamic features [J].
Islam, Rafiqul ;
Tian, Ronghua ;
Batten, Lynn M. ;
Versteeg, Steve .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) :646-656