Cargando…

Deep Feature Extraction and Classification of Android Malware Images

The Android operating system has gained popularity and evolved rapidly since the previous decade. Traditional approaches such as static and dynamic malware identification techniques require a lot of human intervention and resources to design the malware classification model. The real challenge lies...

Descripción completa

Detalles Bibliográficos
Autores principales: Singh, Jaiteg, Thakur, Deepak, Ali, Farman, Gera, Tanya, Kwak, Kyung Sup
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7762531/
https://www.ncbi.nlm.nih.gov/pubmed/33302430
http://dx.doi.org/10.3390/s20247013
_version_ 1783627828150927360
author Singh, Jaiteg
Thakur, Deepak
Ali, Farman
Gera, Tanya
Kwak, Kyung Sup
author_facet Singh, Jaiteg
Thakur, Deepak
Ali, Farman
Gera, Tanya
Kwak, Kyung Sup
author_sort Singh, Jaiteg
collection PubMed
description The Android operating system has gained popularity and evolved rapidly since the previous decade. Traditional approaches such as static and dynamic malware identification techniques require a lot of human intervention and resources to design the malware classification model. The real challenge lies with the fact that inspecting all files of the application structure leads to high processing time, more storage, and manual effort. To solve these problems, optimization algorithms and deep learning has been recently tested for mitigating malware attacks. This manuscript proposes Summing of neurAl aRchitecture and VisualizatiOn Technology for Android Malware identification (SARVOTAM). The system converts the malware non-intuitive features into fingerprint images to extract the quality information. A fine-tuned Convolutional Neural Network (CNN) is used to automatically extract rich features from visualized malware thus eliminating the feature engineering and domain expert cost. The experiments were done using the DREBIN dataset. A total of fifteen different combinations of the Android malware image sections were used to identify and classify Android malware. The softmax layer of CNN was substituted with machine learning algorithms like K-Nearest Neighbor (KNN), Support Vector Machine (SVM), and Random Forest (RF) to analyze the grayscale malware images. It is observed that CNN-SVM model outperformed original CNN as well as CNN-KNN, and CNN-RF. The classification results showed that our method is able to achieve an accuracy of 92.59% using Android certificates and manifest malware images. This paper reveals the lightweight solution and much precise option for malware identification.
format Online
Article
Text
id pubmed-7762531
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-77625312020-12-26 Deep Feature Extraction and Classification of Android Malware Images Singh, Jaiteg Thakur, Deepak Ali, Farman Gera, Tanya Kwak, Kyung Sup Sensors (Basel) Article The Android operating system has gained popularity and evolved rapidly since the previous decade. Traditional approaches such as static and dynamic malware identification techniques require a lot of human intervention and resources to design the malware classification model. The real challenge lies with the fact that inspecting all files of the application structure leads to high processing time, more storage, and manual effort. To solve these problems, optimization algorithms and deep learning has been recently tested for mitigating malware attacks. This manuscript proposes Summing of neurAl aRchitecture and VisualizatiOn Technology for Android Malware identification (SARVOTAM). The system converts the malware non-intuitive features into fingerprint images to extract the quality information. A fine-tuned Convolutional Neural Network (CNN) is used to automatically extract rich features from visualized malware thus eliminating the feature engineering and domain expert cost. The experiments were done using the DREBIN dataset. A total of fifteen different combinations of the Android malware image sections were used to identify and classify Android malware. The softmax layer of CNN was substituted with machine learning algorithms like K-Nearest Neighbor (KNN), Support Vector Machine (SVM), and Random Forest (RF) to analyze the grayscale malware images. It is observed that CNN-SVM model outperformed original CNN as well as CNN-KNN, and CNN-RF. The classification results showed that our method is able to achieve an accuracy of 92.59% using Android certificates and manifest malware images. This paper reveals the lightweight solution and much precise option for malware identification. MDPI 2020-12-08 /pmc/articles/PMC7762531/ /pubmed/33302430 http://dx.doi.org/10.3390/s20247013 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Singh, Jaiteg
Thakur, Deepak
Ali, Farman
Gera, Tanya
Kwak, Kyung Sup
Deep Feature Extraction and Classification of Android Malware Images
title Deep Feature Extraction and Classification of Android Malware Images
title_full Deep Feature Extraction and Classification of Android Malware Images
title_fullStr Deep Feature Extraction and Classification of Android Malware Images
title_full_unstemmed Deep Feature Extraction and Classification of Android Malware Images
title_short Deep Feature Extraction and Classification of Android Malware Images
title_sort deep feature extraction and classification of android malware images
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7762531/
https://www.ncbi.nlm.nih.gov/pubmed/33302430
http://dx.doi.org/10.3390/s20247013
work_keys_str_mv AT singhjaiteg deepfeatureextractionandclassificationofandroidmalwareimages
AT thakurdeepak deepfeatureextractionandclassificationofandroidmalwareimages
AT alifarman deepfeatureextractionandclassificationofandroidmalwareimages
AT geratanya deepfeatureextractionandclassificationofandroidmalwareimages
AT kwakkyungsup deepfeatureextractionandclassificationofandroidmalwareimages