Mitigating the Risks of Malware Attacks with Deep Learning Techniques

被引:5
|
作者
Alnajim, Abdullah M. [1 ]
Habib, Shabana [1 ]
Islam, Muhammad [2 ]
Albelaihi, Rana [3 ]
Alabdulatif, Abdulatif [4 ]
机构
[1] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
[2] Qassim Univ, Unaizah Coll Engn, Dept Elect Engn, Buraydah 51452, Saudi Arabia
[3] Coll Engn & Informat Technol, Onaizah Coll, Dept Comp Sci, Onaizah 56447, Saudi Arabia
[4] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 51452, Saudi Arabia
关键词
attention module; cyber security; deep learning; malware classification; PREDICTION; VISION; MODEL; IOT;
D O I
10.3390/electronics12143166
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware has become increasingly prevalent in recent years, endangering people, businesses, and digital assets worldwide. Despite the numerous techniques and methodologies proposed for detecting and neutralizing malicious agents, modern automated malware creation methods continue to produce malware that can evade modern detection techniques. This has increased the need for advanced and accurate malware classification and detection techniques. This paper offers a unique method for classifying malware, using images that use dual attention and convolutional neural networks. Our proposed model has demonstrated exceptional performance in malware classification, achieving the remarkable accuracy of 98.14% on the Malimg benchmark dataset. To further validate its effectiveness, we also evaluated the model's performance on the big 2015 dataset, where it achieved an even higher accuracy rate of 98.95%, surpassing previous state-of-the-art solutions. Several metrics, including the precision, recall, specificity, and F1 score were used to evaluate accuracy, showing how well our model performed. Additionally, we used class-balancing strategies to increase the accuracy of our model. The results obtained from our experiments indicate that our suggested model is of great interest, and can be applied as a trustworthy method for image-based malware detection, even when compared to more complex solutions. Overall, our research highlights the potential of deep learning frameworks to enhance cyber security measures, and mitigate the risks associated with malware attacks.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks
    Roseline, S. Abijah
    Geetha, S.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 92
  • [2] Malware Detection with Malware Images using Deep Learning Techniques
    He, Ke
    Kim, Dong Seong
    [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 95 - 102
  • [3] Mitigating Webshell Attacks through Machine Learning Techniques
    Guo, You
    Marco-Gisbert, Hector
    Keir, Paul
    [J]. FUTURE INTERNET, 2020, 12 (01):
  • [4] Malware Detection Techniques Based on Deep Learning
    Sreekumari, Prasanthi
    [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 65 - 70
  • [5] Deep Learning for Launching and Mitigating Wireless Jamming Attacks
    Erpek, Tugba
    Sagduyu, Yalin E.
    Shi, Yi
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2019, 5 (01) : 2 - 14
  • [6] Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques
    Nadeem, Muhammad Waqas
    Goh, Hock Guan
    Aun, Yichiet
    Ponnusamy, Vasaki
    [J]. IEEE ACCESS, 2023, 11 (49153-49171) : 49153 - 49171
  • [7] A Study on Detection of Malware Attacks Using Machine Learning Techniques
    Yang, Daojing
    [J]. International Journal of Network Security, 2023, 25 (06): : 1042 - 1047
  • [8] A review of deep learning based malware detection techniques
    Wang, Huijuan
    Cui, Boyan
    Yuan, Quanbo
    Shi, Ruonan
    Huang, Mengying
    [J]. Neurocomputing, 2024, 598
  • [9] Applying deep learning techniques for Android malware detection
    Zegzhda, Peter
    Zegzhda, Dmitry
    Pavlenko, Evgeny
    Ignatev, Gleb
    [J]. 11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [10] Deep reinforcement learning control approach to mitigating actuator attacks
    Wu, Chengwei
    Pan, Wei
    Staa, Rick
    Liu, Jianxing
    Sun, Guanghui
    Wu, Ligang
    [J]. AUTOMATICA, 2023, 152