Cargando…
Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation
Android has become the leading mobile ecosystem because of its accessibility and adaptability. It has also become the primary target of widespread malicious apps. This situation needs the immediate implementation of an effective malware detection system. In this study, an explainable malware detecti...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9500905/ https://www.ncbi.nlm.nih.gov/pubmed/36146112 http://dx.doi.org/10.3390/s22186766 |
_version_ | 1784795337827811328 |
---|---|
author | Ullah, Farhan Alsirhani, Amjad Alshahrani, Mohammed Mujib Alomari, Abdullah Naeem, Hamad Shah, Syed Aziz |
author_facet | Ullah, Farhan Alsirhani, Amjad Alshahrani, Mohammed Mujib Alomari, Abdullah Naeem, Hamad Shah, Syed Aziz |
author_sort | Ullah, Farhan |
collection | PubMed |
description | Android has become the leading mobile ecosystem because of its accessibility and adaptability. It has also become the primary target of widespread malicious apps. This situation needs the immediate implementation of an effective malware detection system. In this study, an explainable malware detection system was proposed using transfer learning and malware visual features. For effective malware detection, our technique leverages both textual and visual features. First, a pre-trained model called the Bidirectional Encoder Representations from Transformers (BERT) model was designed to extract the trained textual features. Second, the malware-to-image conversion algorithm was proposed to transform the network byte streams into a visual representation. In addition, the FAST (Features from Accelerated Segment Test) extractor and BRIEF (Binary Robust Independent Elementary Features) descriptor were used to efficiently extract and mark important features. Third, the trained and texture features were combined and balanced using the Synthetic Minority Over-Sampling (SMOTE) method; then, the CNN network was used to mine the deep features. The balanced features were then input into the ensemble model for efficient malware classification and detection. The proposed method was analyzed extensively using two public datasets, CICMalDroid 2020 and CIC-InvesAndMal2019. To explain and validate the proposed methodology, an interpretable artificial intelligence (AI) experiment was conducted. |
format | Online Article Text |
id | pubmed-9500905 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-95009052022-09-24 Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation Ullah, Farhan Alsirhani, Amjad Alshahrani, Mohammed Mujib Alomari, Abdullah Naeem, Hamad Shah, Syed Aziz Sensors (Basel) Article Android has become the leading mobile ecosystem because of its accessibility and adaptability. It has also become the primary target of widespread malicious apps. This situation needs the immediate implementation of an effective malware detection system. In this study, an explainable malware detection system was proposed using transfer learning and malware visual features. For effective malware detection, our technique leverages both textual and visual features. First, a pre-trained model called the Bidirectional Encoder Representations from Transformers (BERT) model was designed to extract the trained textual features. Second, the malware-to-image conversion algorithm was proposed to transform the network byte streams into a visual representation. In addition, the FAST (Features from Accelerated Segment Test) extractor and BRIEF (Binary Robust Independent Elementary Features) descriptor were used to efficiently extract and mark important features. Third, the trained and texture features were combined and balanced using the Synthetic Minority Over-Sampling (SMOTE) method; then, the CNN network was used to mine the deep features. The balanced features were then input into the ensemble model for efficient malware classification and detection. The proposed method was analyzed extensively using two public datasets, CICMalDroid 2020 and CIC-InvesAndMal2019. To explain and validate the proposed methodology, an interpretable artificial intelligence (AI) experiment was conducted. MDPI 2022-09-07 /pmc/articles/PMC9500905/ /pubmed/36146112 http://dx.doi.org/10.3390/s22186766 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Ullah, Farhan Alsirhani, Amjad Alshahrani, Mohammed Mujib Alomari, Abdullah Naeem, Hamad Shah, Syed Aziz Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation |
title | Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation |
title_full | Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation |
title_fullStr | Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation |
title_full_unstemmed | Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation |
title_short | Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation |
title_sort | explainable malware detection system using transformers-based transfer learning and multi-model visual representation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9500905/ https://www.ncbi.nlm.nih.gov/pubmed/36146112 http://dx.doi.org/10.3390/s22186766 |
work_keys_str_mv | AT ullahfarhan explainablemalwaredetectionsystemusingtransformersbasedtransferlearningandmultimodelvisualrepresentation AT alsirhaniamjad explainablemalwaredetectionsystemusingtransformersbasedtransferlearningandmultimodelvisualrepresentation AT alshahranimohammedmujib explainablemalwaredetectionsystemusingtransformersbasedtransferlearningandmultimodelvisualrepresentation AT alomariabdullah explainablemalwaredetectionsystemusingtransformersbasedtransferlearningandmultimodelvisualrepresentation AT naeemhamad explainablemalwaredetectionsystemusingtransformersbasedtransferlearningandmultimodelvisualrepresentation AT shahsyedaziz explainablemalwaredetectionsystemusingtransformersbasedtransferlearningandmultimodelvisualrepresentation |