DETECTION OF ANDROID MALWARE USING DEEP LEARNING ENSEMBLE WITH CHEETAH-OPTIMIZED FEATURE SELECTION
Keywords:
malware detection, android, optimization, extraction and selection of feature, deep learningDOI:
https://doi.org/10.17654/0974165824026Abstract
On account of the rapid growth with mobile threats, it is necessary to safeguard the user security and privacy. Our goal in this article is to develop robust algorithms capable of distinguishing accurately between benign and malicious apps. The paper provides a methodology for Android malware detection, integrating preprocessing, extraction and selection of feature and a novel deep learning-based detection model. The aim of this approach is to address the challenges that are associated with the imbalanced datasets, ensuring a balanced representation of benign and samples through the effective data collection. The Synthetic Minority Oversampling Technique (SMOTE) has been employed for oversampling the minority class that enhances the dataset balance, for imbalance cases. The extraction of feature involves the statistical feature extraction, which includes the measures like standard deviation, median, mean, variance, interquartile range (IQR), skewness, and kurtosis. Flow-based features such as Flow ID and Flow Duration are additionally considered to capture the essential characteristics of the data. For further refining the feature set, a combination of cheetah optimization algorithm (COA) and the variable velocity strategy particle swarm optimization algorithm (VVS-PSO) is employed in selection of features. This hybrid approach is enhanced by the discriminatory power of selected features, which improves the effectiveness of the model. The proposed deep learning-based detection model is named DSDNN (Deep Siamese+DenseNet+NasNet). Ensemble combined with the deep Siamese network for similarity measurement, DenseNet is used for efficient feature extraction, and NasNet is used to enhance learning capabilities. The ensemble of these classifiers ensures a robust and versatile model for the detection of Android malware.
Received: April 11, 2024
Accepted: May 16, 2024
References
K. Liu, S. Xu, G. Xu, M. Zhang, D. Sun and H. Liu, A review of android malware detection approaches based on machine learning, IEEE Access 8 (2020), 124579-124607.
J. Qiu, J. Zhang, W. Luo, L. Pan, S. Nepal and Y. Xiang, A survey of android malware detection with deep neural models, ACM Computing Surveys (CSUR) 53(6) (2020), 1-36.
H. Gao, S. Cheng and W. Zhang, GDroid: Android malware detection and classification with graph convolutional network, Computers and Security 106 (2021), 102264.
Y. Pan, X. Ge, C. Fang and Y. Fan, A systematic literature review of android malware detection using static analysis, IEEE Access 8 (2020), 116363-116379.
M. K. Alzaylaee, S. Y. Yerima and S. Sezer, DL-Droid: deep learning based android malware detection using real devices, Computers and Security 89 (2020), 101663.
V. Kouliaridis and G. Kambourakis, A comprehensive survey on machine learning techniques for android malware detection, Information 12(5) (2021), 185.
D. Zou, Y. Wu, S. Yang, A. Chauhan, W. Yang, J. Zhong, S. Dou and H. Jin, IntDroid: Android malware detection based on API intimacy analysis, ACM Transactions on Software Engineering and Methodology (TOSEM) 30(3) (2021), 1-32.
O. N. Elayan and A. M. Mustafa, Android malware detection using deep learning, Procedia Computer Science 184 (2021), 847-852.
A. Muzaffar, H. R. Hassen, M. A. Lones and H. Zantout, An in-depth review of machine learning based Android malware detection, Computers and Security 121 (2022), 102833.
J. Kim, Y. Ban, E. Ko, H. Cho and J. H. Yi, MAPAS: a practical deep learning-based android malware detection system, International Journal of Information Security 21(4) (2022), 725-738.
S. K. Smmarwar, G. P. Gupta, S. Kumar and P. Kumar, An optimized and efficient android malware detection framework for future sustainable computing, Sustainable Energy Technologies and Assessments 54 (2022), 102852.
L. Meijin, F. Zhiyang, W. Junfeng, C. Luyu, Z. Qi, Y. Tao, W. Yinwei and G. Jiaxuan, A systematic overview of android malware detection, Applied Artificial Intelligence 36(1) (2022), 2007327.
A. Mahindru and A. L. Sangal, SOMDROID: Android malware detection by artificial neural network trained using unsupervised learning, Evolutionary Intelligence 15(1) (2022), 407-437.
A. S. Shatnawi, Q. Yassen and A. Yateem, An android malware detection approach based on static feature analysis using machine learning algorithms, Procedia Computer Science 201 (2022), 653-658.
M. M. Alani and A. I. Awad, Paired: an explainable lightweight android malware detection system, IEEE Access 10 (2022), 73214-73228.
R. Yumlembam, B. Issac, S. M. Jacob and L. Yang, IoT-based android malware detection using graph neural network with adversarial defense, IEEE Internet of Things Journal 10 (2023), 8432-8444.
S. R. Mat, M. F. Ab Razak, M. N. Kahar, J. M. Arif and A. Firdaus, A Bayesian probability model for Android malware detection, ICT Express 8(3) (2022), 424-431.
H. Alamro, W. Mtouaa, S. Aljameel, A. S. Salama, M. A. Hamza and A. Y. Othman, Automated android malware detection using optimal ensemble learning approach for cybersecurity, IEEE Access 11 (2023), 72509-72517.
F. Taher, O. AlFandi, M. Al-Kfairy, H. Al Hamadi and S. Alrabaee, DroidDetectMW: a hybrid intelligent model for android malware detection, Appl. Sci. 13(13) (2023), 7720.
N. Xie, Z. Qin and X. Di, GA-StackingMD: Android malware detection method based on genetic algorithm optimized stacking, Appl. Sci. 13(4) (2023), 2629.
Y. Wu, J. Shi, P. Wang, D. Zeng and C. Sun, DeepCatra: Learning flow-and graph-based behaviours for Android malware detection, IET Information Security 17(1) (2023), 118-130.
L. Huang, J. Xue, Y. Wang, D. Qu, J. Chen, N. Zhang and L. Zhang, EAODroid: Android malware detection based on enhanced API order, Chinese Journal of Electronics 32(5) (2023), 1169-1178.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 PUSHPA PUBLISHING HOUSE, PRAYAGRAJ, INDIA

This work is licensed under a Creative Commons Attribution 4.0 International License.
_________________________
Attribution: Credit Pushpa Publishing House as the original publisher, including title and author(s) if applicable.
Contact Pushpa Publishing House for more info or permissions.
Journal Impact Factor: 