Transfer Learning for Image-Based Malware Detection for IoT

被引:8
作者
Panda, Pratyush [1 ]
Om Kumar, C. U. [1 ]
Marappan, Suguna [1 ]
Ma, Suresh [2 ]
Manimurugan, S. [3 ]
Nandi, Deeksha Veesani [4 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai 600127, India
[2] Amrita Vishwa Vidyapeetham, Amrita Sch Business, Coimbatore 641112, India
[3] Univ Tabuk, Fac Comp & Informat Technol, Tabuk 71491, Saudi Arabia
[4] Virtusa Consulting Serv, Tech Lead, Chennai 603103, India
关键词
malware detection; CNN; transfer learning; ensemble; autoencoder; GRU; MLP; MalImg;
D O I
10.3390/s23063253
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The tremendous growth in online activity and the Internet of Things (IoT) led to an increase in cyberattacks. Malware infiltrated at least one device in almost every household. Various malware detection methods that use shallow or deep IoT techniques were discovered in recent years. Deep learning models with a visualization method are the most commonly and popularly used strategy in most works. This method has the benefit of automatically extracting features, requiring less technical expertise, and using fewer resources during data processing. Training deep learning models that generalize effectively without overfitting is not feasible or appropriate with large datasets and complex architectures. In this paper, a novel ensemble model, Stacked Ensemble-autoencoder, GRU, and MLP or SE-AGM, composed of three light-weight neural network models-autoencoder, GRU, and MLP-that is trained on the 25 essential and encoded extracted features of the benchmark MalImg dataset for classification was proposed. The GRU model was tested for its suitability in malware detection due to its lesser usage in this domain. The proposed model used a concise set of malware features for training and classifying the malware classes, which reduced the time and resource consumption in comparison to other existing models. The novelty lies in the stacked ensemble method where the output of one intermediate model works as input for the next model, thereby refining the features as compared to the general notion of an ensemble approach. Inspiration was drawn from earlier image-based malware detection works and transfer learning ideas. To extract features from the MalImg dataset, a CNN-based transfer learning model that was trained from scratch on domain data was used. Data augmentation was an important step in the image processing stage to investigate its effect on classifying grayscale malware images in the MalImg dataset. SE-AGM outperformed existing approaches on the benchmark MalImg dataset with an average accuracy of 99.43%, demonstrating that our method was on par with or even surpassed them.
引用
收藏
页数:30
相关论文
共 75 条
  • [1] analyticsvidhya, TRANSF LEARN PRETR M
  • [2] Malware visualization and detection using DenseNets
    Anandhi V.
    Vinod P.
    Menon V.G.
    [J]. Personal and Ubiquitous Computing, 2024, 28 (01) : 153 - 169
  • [3] [Anonymous], GOOGL SAF BROWS GOOG
  • [4] [Anonymous], 2021, CHECK POINT SOFTW
  • [5] [Anonymous], MAGGL MAL DATASET901
  • [6] IoT malware detection architecture using a novel channel boosted and squeezed CNN
    Asam, Muhammad
    Khan, Saddam Hussain
    Akbar, Altaf
    Bibi, Sameena
    Jamal, Tauseef
    Khan, Asifullah
    Ghafoor, Usman
    Bhutta, Muhammad Raheel
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)
  • [7] DeepVisDroid: android malware detection by hybridizing image-based features with deep learning techniques
    Bakour, Khaled
    Unver, Halil Murat
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (18) : 11499 - 11516
  • [8] VisDroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques
    Bakour, Khaled
    Unver, Halil Murat
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (08) : 3133 - 3153
  • [9] Bhodia N., 2019, P 3 INT WORKSHOP FOR
  • [10] Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work
    Campanile, Lelio
    Iacono, Mauro
    Levis, Alexander H.
    Marulli, Fiammetta
    Mastroianni, Michele
    [J]. IEEE SECURITY & PRIVACY, 2021, 19 (01) : 34 - 43