A Malware Detection and Extraction Method for the Related Information Using the ViT Attention Mechanism on Android Operating System

被引:11
作者
Jo, Jeonggeun [1 ]
Cho, Jaeik [2 ]
Moon, Jongsub [1 ]
机构
[1] Korea Univ, Dept Informat Secur, Seoul 02841, South Korea
[2] Lewis Univ, Dept Comp Sci, Romeoville, IL 60446 USA
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 11期
关键词
explainable artificial intelligence (XAI); deep learning; cybersecurity; mobile malware; malware detection; visualization;
D O I
10.3390/app13116839
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Artificial intelligence (AI) is increasingly being utilized in cybersecurity, particularly for detecting malicious applications. However, the black-box nature of AI models presents a significant challenge. This lack of transparency makes it difficult to understand and trust the results. In order to address this, it is necessary to incorporate explainability into the detection model. There is insufficient research to provide reasons why applications are detected as malicious or explain their behavior. In this paper, we propose a method of a Vision Transformer(ViT)-based malware detection model and malicious behavior extraction using an attention map to achieve high detection accuracy and high interpretability. Malware detection uses a ViT-based model, which takes an image as input. ViT offers a significant advantage for image detection tasks by leveraging attention mechanisms, enabling robust interpretation and understanding of the intricate patterns within the images. The image is converted from an application. An attention map is generated with attention values generated during the detection process. The attention map is used to identify factors that the model deems important. Class and method names are extracted and provided based on the identified factors. The performance of the detection was validated using real-world datasets. The malware detection accuracy was 80.27%, which is a high level of accuracy compared to other models used for image-based malware detection. The interpretability was measured in the same way as the F1-score, resulting in an interpretability score of 0.70. This score is superior to existing interpretable machine learning (ML)-based methods, such as Drebin, LIME, and XMal. By analyzing malicious applications, we also confirmed that the extracted classes and methods are related to malicious behavior. With the proposed method, security experts can understand the reason behind the model's detection and the behavior of malicious applications. Given the growing importance of explainable artificial intelligence in cybersecurity, this method is expected to make a significant contribution to this field.
引用
收藏
页数:22
相关论文
共 45 条
[21]  
JADX, About us
[22]   Transformers in Vision: A Survey [J].
Khan, Salman ;
Naseer, Muzammal ;
Hayat, Munawar ;
Zamir, Syed Waqas ;
Khan, Fahad Shahbaz ;
Shah, Mubarak .
ACM COMPUTING SURVEYS, 2022, 54 (10S)
[23]   Towards Explainable CNNs for Android Malware Detection [J].
Kinkead, Martin ;
Millar, Stuart ;
McLaughlin, Niall ;
O'Kane, Philip .
12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 :959-965
[24]  
Liu H, 2019, Arxiv, DOI arXiv:1811.00196
[25]   A Review of Android Malware Detection Approaches Based on Machine Learning [J].
Liu, Kaijun ;
Xu, Shengwei ;
Xu, Guoai ;
Zhang, Miao ;
Sun, Dawei ;
Liu, Haifeng .
IEEE ACCESS, 2020, 8 :124579-124607
[26]   Deep Learning for Android Malware Defenses: A Systematic Literature Review [J].
Liu, Yue ;
Tantithamthavorn, Chakkrit ;
Li, Li ;
Liu, Yepang .
ACM COMPUTING SURVEYS, 2023, 55 (08)
[27]   Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder [J].
Mahdavifar, Samaneh ;
Alhadidi, Dima ;
Ghorbani, Ali. A. .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (01)
[28]   Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning [J].
Mahdavifar, Samaneh ;
Kadir, Andi Fitriah Abdul ;
Fatemi, Rasool ;
Alhadidi, Dima ;
Ghorbani, Ali A. .
2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, :515-522
[29]  
Perarasi T., 2020, P 2020 2 INT C INVEN, P269, DOI [10.1109/ICIRCA48905.2020.9183184, DOI 10.1109/ICIRCA48905.2020.9183184]
[30]   End-to-end malware detection for android IoT devices using deep learning [J].
Ren, Zhongru ;
Wu, Haomin ;
Ning, Qian ;
Hussain, Iftikhar ;
Chen, Bingcai .
AD HOC NETWORKS, 2020, 101