Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model

被引:29
作者
Alzubi, Omar A. [1 ]
Alzubi, Jafar A. [2 ]
Alzubi, Tareq Mahmod [1 ]
Singh, Ashish [3 ]
机构
[1] Al Balqa Appl Univ, Prince Abdullah bin Ghazi Fac Informat & Commun Te, Al Salt, Jordan
[2] Al Balqa Appl Univ, Fac Engn, Al Salt, Jordan
[3] Deemed Univ, Sch Comp Engn, Kalinga Inst Ind Technol, Bhubaneswar, India
关键词
Security; Malware detection; Machine learning; Deep learning; LSTM; Metaheuristics; Feature selection; AUTOMATIC ABSTRACTION; SYMMETRY REDUCTION; VERIFICATION; TRANSPORT; SYSTEMS;
D O I
10.1007/s11036-023-02105-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware refers to malicious software developed to penetrate or damage a computer system without any owner's informed consent. It uses target system susceptibilities, like bugs in legitimate software that can be harmed. For dealing with the new malware, new approaches have been developed to identify and prevent any damage caused. The recent advances in Deep Learning (DL) models are useful for malware detection because they are trained via feature learning instead of task-specific approaches. This paper presents an Optimal Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification (OELSTM-MDC) technique. The presented OELSTM-MDC technique involves the identification and classification of malware. To accomplish this, the OELSTM-MDC model applies pre-processing in the initial stage for data normalization. In addition, Quantum Mayfly Optimization-based Feature Selection (QMFO-FS) approach is derived from choosing an optimal subset of features. Finally, the Butterfly Optimization Algorithm (BOA) is employed for optimal hyperparameter tuning of the ELSTM model. A wide range of empirical analysis is investigated on benchmark datasets to assess the better malware classification performance of the OELSTM-MDC model. It is also compared with the conventional machine learning models such as Random Forest, XGBoost, support vector machine, etc. According to the comparison studies, the OELSTM-MDC model outperformed conventional techniques by detecting the malware class and benign class with accuracy of 97.14% and 98.33% based on the training and testing datasets.
引用
收藏
页码:795 / 807
页数:13
相关论文
共 45 条
[1]   Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review [J].
Alamleh, Amneh ;
Albahri, O. S. ;
Zaidan, A. A. ;
Alamoodi, A. H. ;
Albahri, A. S. ;
Zaidan, B. B. ;
Qahtan, Sarah ;
Binti Ismail, Amelia Ritahani ;
Malik, R. Q. ;
Baqer, M. J. ;
Jasim, Ali Najm ;
Al-Samarraay, Mohammed S. .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2023, 22 (01) :589-636
[2]   Fusion of deep learning based cyberattack detection and classification model for intelligent systems [J].
Alzubi, Omar A. ;
Qiqieh, Issa ;
Alzubi, Jafar A. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02) :1363-1374
[3]   Quantum readout and gradient deep learning model for secure and sustainable data access in IWSN [J].
Alzubi, Omar A. .
PEERJ COMPUTER SCIENCE, 2022, 8
[4]   A deep learning- based frechet and dirichlet model for intrusion detection in IWSN [J].
Alzubi, Omar A. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (02) :873-883
[5]   An efficient malware detection approach with feature weighting based on Harris Hawks optimization [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Al-Zoubi, Ala' M. ;
Hassonah, Mohammad A. ;
Kose, Utku .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04) :2369-2387
[6]  
APKPure, 2022, DATASET V1 0 APKPURE
[7]   Butterfly optimization algorithm: a novel approach for global optimization [J].
Arora, Sankalap ;
Singh, Satvir .
SOFT COMPUTING, 2019, 23 (03) :715-734
[8]   A New Malware Classification Framework Based on Deep Learning Algorithms [J].
Aslan, Omer ;
Yilmaz, Abdullah Asim .
IEEE ACCESS, 2021, 9 :87936-87951
[9]   Image-Based Malware Classification Using VGG19 Network and Spatial Convolutional Attention [J].
Awan, Mazhar Javed ;
Masood, Osama Ahmed ;
Mohammed, Mazin Abed ;
Yasin, Awais ;
Zain, Azlan Mohd ;
Damasevicius, Robertas ;
Abdulkareem, Karrar Hameed .
ELECTRONICS, 2021, 10 (19)
[10]   A survey on adversarial attacks and defences [J].
Chakraborty, Anirban ;
Alam, Manaar ;
Dey, Vishal ;
Chattopadhyay, Anupam ;
Mukhopadhyay, Debdeep .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021, 6 (01) :25-45