Identifying Malicious Software Using Deep Residual Long-Short Term Memory

被引:23
作者
Alotaibi, Aziz [1 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, At Taif 21974, Saudi Arabia
关键词
Malware Detection; android malware; malware analysis; malware classification; static analysis; deep learning-based algorithms; ANDROID MALWARE DETECTION;
D O I
10.1109/ACCESS.2019.2951751
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of smartphone applications based on the Android OS platform is rapidly growing among smartphone users. However, malicious apps for Android are being developed to perform attacks, such as destroying operating systems, stealing confidential data, gathering personal information, and hijacking or encrypting sensitive data. Several malware detection systems based on machine learning have been developed and deployed to extract a variety of features to prevent such attacks. However, new efficient detection methods are needed to extract complex features and hidden structures from malicious apps to detect malware. This paper proposes a novel framework, namely, MalResLSTM, based on deep residual long short-term memory to identify and classify malware variants. The framework imposes a set of constraints on the deep learning architecture to capture dependencies between the extracted features from the Android package kit (APK) file. These feature sets are mapped to a vector space to process the input sequence using a sequence model based on the residual LSTM network. To evaluate the performance of the proposed framework, several experiments are conducted on the Drebin dataset, which contains 129,013 applications. The results demonstrate that MalResLSTM can achieve a 99.32% detection accuracy and outperforms previous algorithms. An extensive experimental analysis was conducted, which included machine-learning-based algorithms and a variety of deep learning-based algorithms, to evaluate the efficiency and robustness of our proposed framework.
引用
收藏
页码:163128 / 163137
页数:10
相关论文
共 52 条
[1]   Malware Detection in Cloud Infrastructures using Convolutional Neural Networks [J].
Abdelsalam, Mahmoud ;
Krishnan, Ram ;
Huang, Yufei ;
Sandhu, Ravi .
PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, :162-169
[2]   DroidNative: Automating and optimizing detection of Android native code malware variants [J].
Alam, Shahid ;
Qu, Zhengyang ;
Riley, Ryan ;
Chen, Yan ;
Rastogi, Vaibhav .
COMPUTERS & SECURITY, 2017, 65 :230-246
[3]  
[Anonymous], DEV ANDROID MALWARE
[4]  
[Anonymous], 2016, IEEE T INF FORENSICS
[5]  
[Anonymous], 2019, P 5 INT C INFORM SYS
[6]  
[Anonymous], 2014, CYBERSECURITY SYSTEM
[7]  
[Anonymous], PROC CVPR IEEE
[8]  
[Anonymous], 2015, ARXIV PREPRINT ARXIV
[9]  
[Anonymous], P INT C DAT MIN DMIN
[10]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,