Cargando…
Android malware detection method based on highly distinguishable static features and DenseNet
The rapid growth of malware has become a serious problem that threatens the security of the mobile ecosystem and needs to be studied and resolved. Android is the main target of attackers due to its open source and popularity. To solve this serious problem, an accurate and efficient malware detection...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9683612/ https://www.ncbi.nlm.nih.gov/pubmed/36417464 http://dx.doi.org/10.1371/journal.pone.0276332 |
_version_ | 1784835089822121984 |
---|---|
author | Yang, Jiyun Zhang, Zhibo Zhang, Heng Fan, JiaWen |
author_facet | Yang, Jiyun Zhang, Zhibo Zhang, Heng Fan, JiaWen |
author_sort | Yang, Jiyun |
collection | PubMed |
description | The rapid growth of malware has become a serious problem that threatens the security of the mobile ecosystem and needs to be studied and resolved. Android is the main target of attackers due to its open source and popularity. To solve this serious problem, an accurate and efficient malware detection method is needed. Most existing methods use a single type of feature, which can be easily bypassed, resulting in low detection accuracy. In addition, although multiple types of features are used in some methods to solve the drawbacks of detection methods using a single type of feature, there are still some problems. Firstly, due to multiple types of features, the number of features in the initial feature set is extremely large, and some methods directly use them for training, resulting in excessive overhead. Furthermore, some methods utilize feature selection to reduce the dimensionality of features, but they do not select highly distinguishable features, resulting in poor detection performance. In this article, an effective and accurate method for identifying Android malware, which is based on an analysis of the use of seven types of static features in Android is proposed to cope with the rapid increase in the amount of Android malware and overcome the drawbacks of detection methods using a single type of feature. Instead of utilizing all extracted features, we design three levels of feature selection methods to obtain highly distinguishable features that can be effective in identifying malware. Then a fully densely connected convolutional network based on DenseNet is adopted to leverage features more efficiently and effectively for malware detection. Compared with the number of features in the original feature set, the number of features in the feature set obtained by the three levels of feature selection methods is reduced by about 97%, but the accuracy is only reduced by 0.45%, and the accuracy is more than 99% in a variety of machine learning methods. Moreover, we compare our detection method with different machine learning models, and the experimental results show that our method outperforms general machine learning models. We also compare the performance of our detection method with two state-of-the-art neural networks. The experimental results show that our detection model can greatly reduce the training cost and still achieve good detection performance, reaching an accuracy of 99.72%. In addition, we compare our detection method with other similar detection methods that also use multiple types of features. The results show that our detection method is superior to the comparison methods. |
format | Online Article Text |
id | pubmed-9683612 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-96836122022-11-24 Android malware detection method based on highly distinguishable static features and DenseNet Yang, Jiyun Zhang, Zhibo Zhang, Heng Fan, JiaWen PLoS One Research Article The rapid growth of malware has become a serious problem that threatens the security of the mobile ecosystem and needs to be studied and resolved. Android is the main target of attackers due to its open source and popularity. To solve this serious problem, an accurate and efficient malware detection method is needed. Most existing methods use a single type of feature, which can be easily bypassed, resulting in low detection accuracy. In addition, although multiple types of features are used in some methods to solve the drawbacks of detection methods using a single type of feature, there are still some problems. Firstly, due to multiple types of features, the number of features in the initial feature set is extremely large, and some methods directly use them for training, resulting in excessive overhead. Furthermore, some methods utilize feature selection to reduce the dimensionality of features, but they do not select highly distinguishable features, resulting in poor detection performance. In this article, an effective and accurate method for identifying Android malware, which is based on an analysis of the use of seven types of static features in Android is proposed to cope with the rapid increase in the amount of Android malware and overcome the drawbacks of detection methods using a single type of feature. Instead of utilizing all extracted features, we design three levels of feature selection methods to obtain highly distinguishable features that can be effective in identifying malware. Then a fully densely connected convolutional network based on DenseNet is adopted to leverage features more efficiently and effectively for malware detection. Compared with the number of features in the original feature set, the number of features in the feature set obtained by the three levels of feature selection methods is reduced by about 97%, but the accuracy is only reduced by 0.45%, and the accuracy is more than 99% in a variety of machine learning methods. Moreover, we compare our detection method with different machine learning models, and the experimental results show that our method outperforms general machine learning models. We also compare the performance of our detection method with two state-of-the-art neural networks. The experimental results show that our detection model can greatly reduce the training cost and still achieve good detection performance, reaching an accuracy of 99.72%. In addition, we compare our detection method with other similar detection methods that also use multiple types of features. The results show that our detection method is superior to the comparison methods. Public Library of Science 2022-11-23 /pmc/articles/PMC9683612/ /pubmed/36417464 http://dx.doi.org/10.1371/journal.pone.0276332 Text en © 2022 Yang et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Yang, Jiyun Zhang, Zhibo Zhang, Heng Fan, JiaWen Android malware detection method based on highly distinguishable static features and DenseNet |
title | Android malware detection method based on highly distinguishable static features and DenseNet |
title_full | Android malware detection method based on highly distinguishable static features and DenseNet |
title_fullStr | Android malware detection method based on highly distinguishable static features and DenseNet |
title_full_unstemmed | Android malware detection method based on highly distinguishable static features and DenseNet |
title_short | Android malware detection method based on highly distinguishable static features and DenseNet |
title_sort | android malware detection method based on highly distinguishable static features and densenet |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9683612/ https://www.ncbi.nlm.nih.gov/pubmed/36417464 http://dx.doi.org/10.1371/journal.pone.0276332 |
work_keys_str_mv | AT yangjiyun androidmalwaredetectionmethodbasedonhighlydistinguishablestaticfeaturesanddensenet AT zhangzhibo androidmalwaredetectionmethodbasedonhighlydistinguishablestaticfeaturesanddensenet AT zhangheng androidmalwaredetectionmethodbasedonhighlydistinguishablestaticfeaturesanddensenet AT fanjiawen androidmalwaredetectionmethodbasedonhighlydistinguishablestaticfeaturesanddensenet |