RESEARCH ON DEEP LEARNING TECHNOLOGY TO DETECT MALICIOUS FOR HEALTHCARE SYSTEM

被引:1
作者
Nong, Mengxin [1 ]
Chang, Hunt-teng [2 ]
Huang, Lingfeng [3 ]
机构
[1] Dongguan Polytechn, Sch Artificial Intelligence, Dongguan 523808, Peoples R China
[2] Yu Da Univ Sci & Technol, Dept Multimedia & Game Design, Miaoli 36100, Taiwan
[3] Dongguan Polytechn, Sch Elecron Informat, Dongguan 523808, Peoples R China
关键词
Healthcare system; business intelligence; deep learning; machine learning; random forest; malicious programs; MALWARE DETECTION; NETWORKS; PATTERNS;
D O I
10.1142/S0219519423400547
中图分类号
Q6 [生物物理学];
学科分类号
071011 ;
摘要
With the popularity of smart phones, Android has a large number of users. Android allows download and installation of other unofficial healthcare system applications, so it has attracted the attention of malware developers for healthcare system. However, most of the papers proposed a variety of different methods to improve accuracy, and the samples tested by each method in the experimental part are different, which may cause errors in comparison. It shows that permission is an important of the development as mobile phone storage. Therefore, this paper proposed Android's Permission and application program interface (API) as two features to perform machine learning to detect malicious programs business intelligence. It also uses machine learning method and other two algorithms to detect malicious programs. The average accuracy of using hybrid detection of unknown malicious programs reaches 89%, and the hit rate near 90%. The results show that under the same sample situation, the accuracy rate of the hybrid method used Random Forest is higher than the other two analyses. Compared with the dynamic analysis with others, it used the hybrid method and dynamic analysis has a high accuracy rate. The contribution of this paper is as follows: the advantage of static detection is that it does not need to execute Android application package (APK) features be extracted, and the speed is the fastest among the three detection modules. The features of dynamic detection for healthcare system are generated through the executed APK, and more powerful features can be extracted. Hybrid detection uses two method features, and extract most advantageous features to generate detection modules to detect APKs. The accuracy of static results about 87% in average, 88% for dynamic, and 89% for hybrid.
引用
收藏
页数:22
相关论文
共 50 条
[1]   SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [J].
Arshad, Saba ;
Shah, Munam A. ;
Wahid, Abdul ;
Mehmood, Amjad ;
Song, Houbing ;
Yu, Hongnian .
IEEE ACCESS, 2018, 6 :4321-4339
[2]  
Babu N., 2017 INT C EN COMM D
[3]  
Bhatia T, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), DOI 10.1109/CyberSecPODS.2017.8074847
[4]   Discovering high utility-occupancy patterns from uncertain data [J].
Chen, Chien-Ming ;
Chen, Lili ;
Gan, Wensheng ;
Qiu, Lina ;
Ding, Weiping .
INFORMATION SCIENCES, 2021, 546 :1208-1229
[5]   A secure authenticated and key exchange scheme for fog computing [J].
Chen, Chien-Ming ;
Huang, Yanyu ;
Wang, King-Hang ;
Kumari, Saru ;
Wu, Mu-En .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) :1200-1215
[6]   Resource Allocation With Workload-Time Windows for Cloud-Based Software Services: A Deep Reinforcement Learning Approach [J].
Chen, Xing ;
Yang, Lijian ;
Chen, Zheyi ;
Min, Geyong ;
Zheng, Xianghan ;
Rong, Chunming .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (02) :1871-1885
[7]   A Reinforcement Learning-Empowered Feedback Control System for Industrial Internet of Things [J].
Chen, Xing ;
Hu, Junqin ;
Chen, Zheyi ;
Lin, Bing ;
Xiong, Naixue ;
Min, Geyong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) :2724-2733
[8]   DNNOff: Offloading DNN-Based Intelligent IoT Applications in Mobile Edge Computing [J].
Chen, Xing ;
Li, Ming ;
Zhong, Hao ;
Ma, Yun ;
Hsu, Ching-Hsien .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) :2820-2829
[9]   Energy-Efficient Offloading for DNN-Based Smart IoT Systems in Cloud-Edge Environments [J].
Chen, Xing ;
Zhang, Jianshan ;
Lin, Bing ;
Chen, Zheyi ;
Wolter, Katinka ;
Min, Geyong .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (03) :683-697
[10]   Data recovery in wireless sensor networks based on attribute correlation and extremely randomized trees [J].
Cheng, Hongju ;
Wu, Leihuo ;
Li, Ruixing ;
Huang, Fangwan ;
Tu, Chunyu ;
Yu, Zhiyong .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :245-259