Cargando…

A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization

Android is the most widely used mobile platform, making it a prime target for malicious attacks. Therefore, it is imperative to effectively circumvent these attacks. Recently, machine learning has been a promising solution for malware detection, which relies on distinguishing features. While machine...

Descripción completa

Detalles Bibliográficos
Autores principales: Ullah, Farhan, Srivastava, Gautam, Ullah, Shamsher
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9633577/
https://www.ncbi.nlm.nih.gov/pubmed/36345308
http://dx.doi.org/10.1186/s13677-022-00349-8
_version_ 1784824265532506112
author Ullah, Farhan
Srivastava, Gautam
Ullah, Shamsher
author_facet Ullah, Farhan
Srivastava, Gautam
Ullah, Shamsher
author_sort Ullah, Farhan
collection PubMed
description Android is the most widely used mobile platform, making it a prime target for malicious attacks. Therefore, it is imperative to effectively circumvent these attacks. Recently, machine learning has been a promising solution for malware detection, which relies on distinguishing features. While machine learning-based malware scanners have a large number of features, adversaries can avoid detection by using feature-related expertise. Therefore, one of the main tasks of the Android security industry is to consistently propose cutting-edge features that can detect suspicious activity. This study presents a novel feature representation approach for malware detection that combines API-Call Graphs (ACGs) with byte-level image representation. First, the reverse engineering procedure is used to obtain the Java programming codes and Dalvik Executable (DEX) file from Android Package Kit (APK). Second, to depict Android apps with high-level features, we develop ACGs by mining API-Calls and API sequences from Control Flow Graph (CFG). The ACGs can act as a digital fingerprint of the actions taken by Android apps. Next, the multi-head attention-based transfer learning method is used to extract trained features vector from ACGs. Third, the DEX file is converted to a malware image, and the texture features are extracted and highlighted using a combination of FAST (Features from Accelerated Segment Test) and BRIEF (Binary Robust Independent Elementary Features). Finally, the ACGs and texture features are combined for effective malware detection and classification. The proposed method uses a customized dataset prepared from the CIC-InvesAndMal2019 dataset and outperforms state-of-the-art methods with 99.27% accuracy.
format Online
Article
Text
id pubmed-9633577
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-96335772022-11-05 A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization Ullah, Farhan Srivastava, Gautam Ullah, Shamsher J Cloud Comput (Heidelb) Research Android is the most widely used mobile platform, making it a prime target for malicious attacks. Therefore, it is imperative to effectively circumvent these attacks. Recently, machine learning has been a promising solution for malware detection, which relies on distinguishing features. While machine learning-based malware scanners have a large number of features, adversaries can avoid detection by using feature-related expertise. Therefore, one of the main tasks of the Android security industry is to consistently propose cutting-edge features that can detect suspicious activity. This study presents a novel feature representation approach for malware detection that combines API-Call Graphs (ACGs) with byte-level image representation. First, the reverse engineering procedure is used to obtain the Java programming codes and Dalvik Executable (DEX) file from Android Package Kit (APK). Second, to depict Android apps with high-level features, we develop ACGs by mining API-Calls and API sequences from Control Flow Graph (CFG). The ACGs can act as a digital fingerprint of the actions taken by Android apps. Next, the multi-head attention-based transfer learning method is used to extract trained features vector from ACGs. Third, the DEX file is converted to a malware image, and the texture features are extracted and highlighted using a combination of FAST (Features from Accelerated Segment Test) and BRIEF (Binary Robust Independent Elementary Features). Finally, the ACGs and texture features are combined for effective malware detection and classification. The proposed method uses a customized dataset prepared from the CIC-InvesAndMal2019 dataset and outperforms state-of-the-art methods with 99.27% accuracy. Springer Berlin Heidelberg 2022-11-03 2022 /pmc/articles/PMC9633577/ /pubmed/36345308 http://dx.doi.org/10.1186/s13677-022-00349-8 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Research
Ullah, Farhan
Srivastava, Gautam
Ullah, Shamsher
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
title A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
title_full A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
title_fullStr A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
title_full_unstemmed A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
title_short A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
title_sort malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9633577/
https://www.ncbi.nlm.nih.gov/pubmed/36345308
http://dx.doi.org/10.1186/s13677-022-00349-8
work_keys_str_mv AT ullahfarhan amalwaredetectionsystemusingahybridapproachofmultiheadsattentionbasedcontrolflowtracesandimagevisualization
AT srivastavagautam amalwaredetectionsystemusingahybridapproachofmultiheadsattentionbasedcontrolflowtracesandimagevisualization
AT ullahshamsher amalwaredetectionsystemusingahybridapproachofmultiheadsattentionbasedcontrolflowtracesandimagevisualization
AT ullahfarhan malwaredetectionsystemusingahybridapproachofmultiheadsattentionbasedcontrolflowtracesandimagevisualization
AT srivastavagautam malwaredetectionsystemusingahybridapproachofmultiheadsattentionbasedcontrolflowtracesandimagevisualization
AT ullahshamsher malwaredetectionsystemusingahybridapproachofmultiheadsattentionbasedcontrolflowtracesandimagevisualization