Cargando…
A Modified ResNeXt for Android Malware Identification and Classification
It is critical to successfully identify, mitigate, and fight against Android malware assaults, since Android malware has long been a significant threat to the security of Android applications. Identifying and categorizing dangerous applications into categories that are similar to one another are esp...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9142319/ https://www.ncbi.nlm.nih.gov/pubmed/35634062 http://dx.doi.org/10.1155/2022/8634784 |
_version_ | 1784715548737667072 |
---|---|
author | Albahar, Marwan Ali ElSayed, Mahmoud Said Jurcut, Anca |
author_facet | Albahar, Marwan Ali ElSayed, Mahmoud Said Jurcut, Anca |
author_sort | Albahar, Marwan Ali |
collection | PubMed |
description | It is critical to successfully identify, mitigate, and fight against Android malware assaults, since Android malware has long been a significant threat to the security of Android applications. Identifying and categorizing dangerous applications into categories that are similar to one another are especially important in the development of a safe Android app ecosystem. The categorization of malware families may be used to improve the efficiency of the malware detection process as well as to systematically identify malicious trends. In this study, we proposed a modified ResNeXt model by embedding a new regularization technique to improve the classification task. In addition, we present a comprehensive evaluation of the Android malware classification and detection using our modified ResNeXt. The nonintuitive malware's features are converted into fingerprint images in order to extract the rich information from the input data. In addition, we applied fine-tuned deep learning (DL) based on the convolutional neural network (CNN) on the visualized malware samples to automatically obtain the discriminatory features that separate normal from malicious data. Using DL techniques not only avoids the domain expert costs but also eliminates the frequent need for the feature engineering methods. Furthermore, we evaluated the effectiveness of the modified ResNeXt model in the classification process by testing a total of fifteen different combinations of the Android malware image sections on the Drebin dataset. In this study, we only use grayscale malware images from a modified ResNeXt to analyze the malware samples. The experimental results show that the modified ResNeXt successfully achieved an accuracy of 98.25% using Android certificates only. Furthermore, we undertook extensive trials on the dataset in order to confirm the efficacy of our methodology, and we compared our approach with several existing methods. Finally, this article reveals the evaluation of different models and a much more precise option for malware identification. |
format | Online Article Text |
id | pubmed-9142319 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-91423192022-05-28 A Modified ResNeXt for Android Malware Identification and Classification Albahar, Marwan Ali ElSayed, Mahmoud Said Jurcut, Anca Comput Intell Neurosci Research Article It is critical to successfully identify, mitigate, and fight against Android malware assaults, since Android malware has long been a significant threat to the security of Android applications. Identifying and categorizing dangerous applications into categories that are similar to one another are especially important in the development of a safe Android app ecosystem. The categorization of malware families may be used to improve the efficiency of the malware detection process as well as to systematically identify malicious trends. In this study, we proposed a modified ResNeXt model by embedding a new regularization technique to improve the classification task. In addition, we present a comprehensive evaluation of the Android malware classification and detection using our modified ResNeXt. The nonintuitive malware's features are converted into fingerprint images in order to extract the rich information from the input data. In addition, we applied fine-tuned deep learning (DL) based on the convolutional neural network (CNN) on the visualized malware samples to automatically obtain the discriminatory features that separate normal from malicious data. Using DL techniques not only avoids the domain expert costs but also eliminates the frequent need for the feature engineering methods. Furthermore, we evaluated the effectiveness of the modified ResNeXt model in the classification process by testing a total of fifteen different combinations of the Android malware image sections on the Drebin dataset. In this study, we only use grayscale malware images from a modified ResNeXt to analyze the malware samples. The experimental results show that the modified ResNeXt successfully achieved an accuracy of 98.25% using Android certificates only. Furthermore, we undertook extensive trials on the dataset in order to confirm the efficacy of our methodology, and we compared our approach with several existing methods. Finally, this article reveals the evaluation of different models and a much more precise option for malware identification. Hindawi 2022-05-20 /pmc/articles/PMC9142319/ /pubmed/35634062 http://dx.doi.org/10.1155/2022/8634784 Text en Copyright © 2022 Marwan Ali Albahar et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Albahar, Marwan Ali ElSayed, Mahmoud Said Jurcut, Anca A Modified ResNeXt for Android Malware Identification and Classification |
title | A Modified ResNeXt for Android Malware Identification and Classification |
title_full | A Modified ResNeXt for Android Malware Identification and Classification |
title_fullStr | A Modified ResNeXt for Android Malware Identification and Classification |
title_full_unstemmed | A Modified ResNeXt for Android Malware Identification and Classification |
title_short | A Modified ResNeXt for Android Malware Identification and Classification |
title_sort | modified resnext for android malware identification and classification |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9142319/ https://www.ncbi.nlm.nih.gov/pubmed/35634062 http://dx.doi.org/10.1155/2022/8634784 |
work_keys_str_mv | AT albaharmarwanali amodifiedresnextforandroidmalwareidentificationandclassification AT elsayedmahmoudsaid amodifiedresnextforandroidmalwareidentificationandclassification AT jurcutanca amodifiedresnextforandroidmalwareidentificationandclassification AT albaharmarwanali modifiedresnextforandroidmalwareidentificationandclassification AT elsayedmahmoudsaid modifiedresnextforandroidmalwareidentificationandclassification AT jurcutanca modifiedresnextforandroidmalwareidentificationandclassification |