Android malware detection through generative adversarial networks

被引:38
作者
Amin, Muhammad [1 ,3 ]
Shah, Babar [2 ]
Sharif, Aizaz [3 ]
Alit, Tamleek [1 ]
Kim, Ki-Il [4 ]
Anwar, Sajid [1 ]
机构
[1] Inst Management Sci, Dept Comp Sci, Peshawar, Pakistan
[2] Zayed Univ, Coll Informat Technol, Dubai, U Arab Emirates
[3] Natl Univ Comp & Emerging Sci, Dept Comp Sci, Peshawar 25100, Pakistan
[4] Chungnam Natl Univ, Dept Comp Sci & Engn, Daejeon, South Korea
关键词
D O I
10.1002/ett.3675
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile and cell devices have empowered end users to tweak their cell phones more than ever and introduce applications just as we used to with personal computers. Android likewise portrays an uprise in mobile devices and personal digital assistants. It is an open-source versatile platform fueling incalculable hardware units, tablets, televisions, auto amusement frameworks, digital boxes, and so forth. In a generally shorter life cycle, Android also has additionally experienced a mammoth development in application malware. In this context, a toweringly large measure of strategies has been proposed in theory for the examination and detection of these harmful applications for the Android platform. These strategies attempt to both statically reverse engineer the application and elicit meaningful information as features manually or dynamically endeavor to quantify the runtime behavior of the application to identify malevolence. The overgrowing nature of Android malware has enormously debilitated the support of protective measures, which leaves the platforms such as Android feeble for novel and mysterious malware. Machine learning is being utilized for malware diagnosis in mobile phones as a common practice and in Android distinctively. It is important to specify here that these systems, however, utilize and adapt the learning-based techniques, yet the overhead of hand-created features limits ease of use of such methods in reality by an end user. As a solution to this issue, we mean to make utilization of deep learning-based algorithms as the fundamental arrangement for malware examination on Android. Deep learning turns up as another way of research that has bid the scientific community in the fields of vision, speech, and natural language processing. Of late, models set up on deep convolution networks outmatched techniques utilizing handmade descriptive features at various undertakings. Likewise, our proposed technique to cater malware detection is by design a deep learning model making use of generative adversarial networks, which is responsible to detect the Android malware via famous two-player game theory for a rock-paper-scissor problem. We have used three state-of-the-art datasets and augmented a large-scale dataset of opcodes extracted from the Android Package Kit bytecode and used in our experiments. Our technique achieves F1 score of 99% with a receiver operating characteristic of 99% on the bytecode dataset. This proves the usefulness of our technique and that it can generally be adopted in real life.
引用
收藏
页数:29
相关论文
共 84 条
[1]   Sliding window and control flow weight for metamorphic malware detection [J].
Alam, Shahid ;
Sogukpinar, Ibrahim ;
Traore, Issa ;
Horspool, R. Nigel .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :75-88
[2]   AspectDroid: Android App Analysis System [J].
Ali-Gombe, Aisha ;
Ahmed, Irfan ;
Richard, Golden G., III ;
Roussev, Vassil .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :145-147
[3]  
ALIGOMBE A, 2015, P 5 PROGR PROT REV E
[4]  
[Anonymous], 1973, Two-Person Game Theory
[5]  
[Anonymous], 2012, P 10 INT C MOB SYST
[6]  
[Anonymous], 2004, P 21 INT C MACH LEAR
[7]  
[Anonymous], 1996, Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, DOI DOI 10.1109/SECPRI.1996.502675
[8]  
[Anonymous], 2017, ARXIV170300573
[9]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[10]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33