Employing combined spatial and frequency domain image features for machine learning-based malware detection

被引:0
|
作者
Bashar, Abul [1 ]
机构
[1] Prince Mohammad Bin Fahd Univ, Dept Comp Engn, Khobar 31952, Saudi Arabia
来源
ELECTRONIC RESEARCH ARCHIVE | 2024年 / 32卷 / 07期
关键词
image-based data; spatial and frequency domain; malware identification; machine learning classifiers; feature extraction; feature hybridization; FRAMEWORK;
D O I
10.3934/era.2024192
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The ubiquitous adoption of Android devices has unfortunately brought a surge in malware threats, compromising user data, privacy concerns, and financial and device integrity, to name a few. To combat this, numerous efforts have explored automated botnet detection mechanisms, with anomalybased approaches leveraging machine learning (ML) gaining attraction due to their signature-agnostic nature. However, the problem lies in devising accurate ML models which capture the ever evolving landscape of malwares by effectively leveraging all the possible features from Android application packages (APKs).This paper delved into this domain by proposing, implementing, and evaluating an imagebased Android malware detection (AMD) framework that harnessed the power of feature hybridization. The core idea of this framework was the conversion of text-based data extracted from Android APKs into grayscale images. The novelty aspect of this work lied in the unique image feature extraction strategies and their subsequent hybridization to achieve accurate malware classification using ML models. More specifically, four distinct feature extraction methodologies, namely, Texture and histogram of oriented gradients (HOG) from spatial domain, and discrete wavelet transform (DWT) and Gabor from the frequency domain were employed to hybridize the features for improved malware identification. To this end, three image-based datasets, namely, Dex, Manifest, and Composite, derived from the information security centre of excellence (ISCX) Android Malware dataset, were leveraged to evaluate the optimal data source for botnet classification. Popular ML classifiers, including naive Bayes (NB), multilayer perceptron (MLP), support vector machine (SVM), and random forest (RF), were employed for the classification task. The experimental results demonstrated the efficacy of the proposed framework, achieving a peak classification accuracy of 93.03% and recall of 97.1% for the RF classifier using the Manifest dataset and a combination of Texture and HOG features. These findings validate the proof-of-concept and provide valuable insights for researchers exploring ML/deep learning (DL) approaches in the domain of AMD.
引用
收藏
页码:4255 / 4290
页数:36
相关论文
共 50 条
  • [31] Machine learning-based cyber threat detection: an approach to malware detection and security with explainable AI insights
    Farida Siddiqi Prity
    Md. Shahidul Islam
    Emran Hossain Fahim
    Md. Maruf Hossain
    Sazzad Hossain Bhuiyan
    Md. Ariful Islam
    Mirza Raquib
    Human-Intelligent Systems Integration, 2024, 6 (1) : 61 - 90
  • [32] A novel deep learning-based approach for malware detection
    Shaukat, Kamran
    Luo, Suhuai
    Varadharajan, Vijay
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 122
  • [33] Android Malware Detection Using Machine Learning on Image Patterns
    Darus, Falai Mohd
    Salleh, Noor Azurati Alimad
    Ariffin, Aswami Fadillah Mohd
    PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [34] A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection
    Rai, Sudhir Kumar
    Mittal, Ashish
    Mittal, Sparsh
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [35] Static, Dynamic and Intrinsic Features Based Android Malware Detection Using Machine Learning
    Mantoo, Bilal Ahmad
    Khurana, Surinder Singh
    PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 31 - 45
  • [36] Large-scale Malware Automatic Detection Based On Multiclass Features and Machine Learning
    Wang, Zhiqiang
    Tang, Yao
    Yao, Jing
    Qian, Rong
    Zhang, Zheng
    Ma, Pingchuan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018,
  • [37] ACAMA: Deep Learning-Based Detection and Classification of Android Malware Using API-Based Features
    Ko, Eunbyeol
    Kim, Jinsung
    Ban, Younghoon
    Cho, Haehyun
    Yi, Jeong Hyun
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] Tire tread detection based on fusion of spatial and frequency domain features
    Chen, Qiya
    Dong, Yude
    Wang, Jinbiao
    Yuan, Zhonghang
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART D-JOURNAL OF AUTOMOBILE ENGINEERING, 2024,
  • [39] ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples
    Liu, Xinbo
    Zhang, Jiliang
    Lin, Yaping
    Li, He
    PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS 2019), 2019,
  • [40] Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms
    Chuang, Ping-Jui
    Hsu, Chih-Fan
    Chu, Yung-Tien
    Huang, Szu-Chun
    Huang, Chun-Ying
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 479 - 493