Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Tytuł pozycji:

Android malware detection method based on highly distinguishable static features and DenseNet.

Tytuł:
Android malware detection method based on highly distinguishable static features and DenseNet.
Autorzy:
Yang J; The College of Computer Science, Chongqing University, Chongqing, China.
Zhang Z; The College of Computer Science, Chongqing University, Chongqing, China.
Zhang H; The College of Computer Science, Chongqing University, Chongqing, China.
Fan J; The College of Computer Science, Chongqing University, Chongqing, China.
Źródło:
PloS one [PLoS One] 2022 Nov 23; Vol. 17 (11), pp. e0276332. Date of Electronic Publication: 2022 Nov 23 (Print Publication: 2022).
Typ publikacji:
Journal Article
Język:
English
Imprint Name(s):
Original Publication: San Francisco, CA : Public Library of Science
MeSH Terms:
Ecosystem*
Adaptation, Psychological*
Cost of Illness ; Machine Learning ; Neural Networks, Computer
References:
PLoS One. 2020 Sep 11;15(9):e0238694. (PMID: 32915836)
Multimed Tools Appl. 2021;80(9):13271-13323. (PMID: 33462535)
PLoS One. 2021 Sep 30;16(9):e0257968. (PMID: 34591930)
Entry Date(s):
Date Created: 20221123 Date Completed: 20221125 Latest Revision: 20231102
Update Code:
20240104
PubMed Central ID:
PMC9683612
DOI:
10.1371/journal.pone.0276332
PMID:
36417464
Czasopismo naukowe
The rapid growth of malware has become a serious problem that threatens the security of the mobile ecosystem and needs to be studied and resolved. Android is the main target of attackers due to its open source and popularity. To solve this serious problem, an accurate and efficient malware detection method is needed. Most existing methods use a single type of feature, which can be easily bypassed, resulting in low detection accuracy. In addition, although multiple types of features are used in some methods to solve the drawbacks of detection methods using a single type of feature, there are still some problems. Firstly, due to multiple types of features, the number of features in the initial feature set is extremely large, and some methods directly use them for training, resulting in excessive overhead. Furthermore, some methods utilize feature selection to reduce the dimensionality of features, but they do not select highly distinguishable features, resulting in poor detection performance. In this article, an effective and accurate method for identifying Android malware, which is based on an analysis of the use of seven types of static features in Android is proposed to cope with the rapid increase in the amount of Android malware and overcome the drawbacks of detection methods using a single type of feature. Instead of utilizing all extracted features, we design three levels of feature selection methods to obtain highly distinguishable features that can be effective in identifying malware. Then a fully densely connected convolutional network based on DenseNet is adopted to leverage features more efficiently and effectively for malware detection. Compared with the number of features in the original feature set, the number of features in the feature set obtained by the three levels of feature selection methods is reduced by about 97%, but the accuracy is only reduced by 0.45%, and the accuracy is more than 99% in a variety of machine learning methods. Moreover, we compare our detection method with different machine learning models, and the experimental results show that our method outperforms general machine learning models. We also compare the performance of our detection method with two state-of-the-art neural networks. The experimental results show that our detection model can greatly reduce the training cost and still achieve good detection performance, reaching an accuracy of 99.72%. In addition, we compare our detection method with other similar detection methods that also use multiple types of features. The results show that our detection method is superior to the comparison methods.
Competing Interests: The authors have declared that no competing interests exist.
(Copyright: © 2022 Yang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.)
Zaloguj się, aby uzyskać dostęp do pełnego tekstu.

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies