Detection of android malware with deep learning method using convolutional neural network model

Reza Maulana, Deris Stiawan, Rahmat Budiarto

Abstract


Android malware is an application that targets Android devices to steal crucial data, including money or confidential information from Android users. Recent years have seen a surge in research on Android malware, as its types continue to evolve, and cybersecurity requires periodic improvements. This research focuses on detecting Android malware attack patterns using deep learning and convolutional neural network (CNN) models, which classify and detect malware attack patterns on Android devices into two categories: malware and non-malware. This research contributes to understanding how effective the CNN models are by comparing the ratio of data used with several epochs. We effectively use CNN models to detect malware attack patterns. The results show that the deep learning method with the CNN model can manage unstructured data. The research results indicate that the CNN model demonstrates a minimal error rate during evaluation. The comparison of accuracy, precision, recall, F1 Score, and area under the curve (AUC) values demonstrates the recognition of malware attack patterns, reaching an average of 92% accuracy in data testing. This provides a holistic understanding of the model's performance and its practical utility in detecting Android malware.

Keywords


Android malware; Classification; Convolutional neural network; Deep learning; Pattern recognition

Full Text:

PDF

References


T. Sharma and D. Rattan, “Malicious application detection in android - A systematic literature review,” Computer Science Review, vol. 40, 2021, doi: 10.1016/j.cosrev.2021.100373.

P. Sreekumari, “Malware detection techniques based on deep learning,” Proceedings - 2020 IEEE 6th Intl Conference on Big Data Security on Cloud, BigDataSecurity 2020, 2020 IEEE Intl Conference on High Performance and Smart Computing, HPSC 2020 and 2020 IEEE Intl Conference on Intelligent Data and Security, IDS 2020, pp. 65–70, 2020, doi: 10.1109/BigDataSecurity-HPSC-IDS49724.2020.00023.

P. Yadav, N. Menon, V. Ravi, S. Vishvanathan, and T. D. Pham, “A two-stage deep learning framework for image-based android malware detection and variant classification,” Computational Intelligence, vol. 38, no. 5, pp. 1748–1771, 2022, doi: 10.1111/coin.12532.

A. Razgallah, R. Khoury, S. Hallé, and K. Khanmohammadi, “A survey of malware detection in Android apps: Recommendations and perspectives for future research,” Computer Science Review, vol. 39, 2021, doi: 10.1016/j.cosrev.2020.100358.

S. Sharma, R. Kumar, and C. R. Krishna, “Ransomanalysis: the evolution and investigation of android ransomware,” Lecture Notes in Networks and Systems, vol. 116, pp. 33–41, 2020, doi: 10.1007/978-981-15-3020-3_4.

P. Yadav, N. Menon, V. Ravi, S. Vishvanathan, and T. D. Pham, “EfficientNet convolutional neural networks-based Android malware detection,” Computers and Security, vol. 115, 2022, doi: 10.1016/j.cose.2022.102622.

S. Sharma, R. Kumar, and C. Rama Krishna, “A survey on analysis and detection of Android ransomware,” Concurrency and Computation: Practice and Experience, vol. 33, no. 16, 2021, doi: 10.1002/cpe.6272.

M. Talal et al., “Comprehensive review and analysis of anti-malware apps for smartphones,” Telecommunication Systems, vol. 72, no. 2, pp. 285–337, 2019, doi: 10.1007/s11235-019-00575-7.

Z. Ren, H. Wu, Q. Ning, I. Hussain, and B. Chen, “End-to-end malware detection for android IoT devices using deep learning,” Ad Hoc Networks, vol. 101, 2020, doi: 10.1016/j.adhoc.2020.102098.

L. Chen, C. Xia, S. Lei, and T. Wang, “Detection, traceability, and propagation of mobile malware threats,” IEEE Access, vol. 9, pp. 14576–14598, 2021, doi: 10.1109/ACCESS.2021.3049819.

K. Liu, S. Xu, G. Xu, M. Zhang, D. Sun, and H. Liu, “A review of Android malware detection approaches based on machine learning,” IEEE Access, vol. 8, pp. 124579–124607, 2020, doi: 10.1109/ACCESS.2020.3006143.

S. Peng, L. Cao, Y. Zhou, J. Xie, P. Yin, and J. Mo, “Challenges and trends of Android malware detection in the era of deep learning,” Proceedings - 2020 IEEE 8th International Conference on Smart City and Informatization, iSCI 2020, pp. 37–43, 2020, doi: 10.1109/iSCI50694.2020.00014.

N. Lachtar, D. Ibdah, and A. Bacha, “Toward mobile malware detection through convolutional neural networks,” IEEE Embedded Systems Letters, vol. 13, no. 3, pp. 134–137, 2021, doi: 10.1109/LES.2020.3035875.

D. Waterson, “Managing endpoints, the weakest link in the security chain,” Network Security, vol. 2020, no. 8, pp. 9–13, 2020, doi: 10.1016/S1353-4858(20)30093-3.

J. Hubbard, G. Bendiab, and S. Shiaeles, “IPASS: a novel open-source intelligence password scoring system,” Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022, pp. 90–95, 2022, doi: 10.1109/CSR54599.2022.9850311.

K. Chung, P. Cao, Z. T. Kalbarczyk, and R. K. Iyer, “StealthML: data-driven malware for stealthy data exfiltration,” Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023, pp. 16–21, 2023, doi: 10.1109/CSR57506.2023.10224946.

J. King, G. Bendiab, N. Savage, and S. Shiaeles, “Data exfiltration: methods and detection countermeasures,” Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, CSR 2021, pp. 442–447, 2021, doi: 10.1109/CSR51186.2021.9527962.

O. Aslan and A. A. Yilmaz, “A new malware classification framework based on deep learning algorithms,” IEEE Access, vol. 9, pp. 87936–87951, 2021, doi: 10.1109/ACCESS.2021.3089586.

A. Abusnaina et al., “DL-FHMC: deep learning-based fine-grained hierarchical learning approach for robust malware classification,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 3432–3447, 2022, doi: 10.1109/TDSC.2021.3097296.

Z. Wang, Q. Liu, and Y. Chi, “Review of Android malware detection based on deep learning,” IEEE Access, vol. 8, pp. 181102–181126, 2020, doi: 10.1109/ACCESS.2020.3028370.

Y. Fang, Y. Gao, F. Jing, and L. Zhang, “Android malware familial classification based on DEX file section features,” IEEE Access, vol. 8, pp. 10614–10627, 2020, doi: 10.1109/ACCESS.2020.2965646.

I. U. Haq, T. A. Khan, and A. Akhunzada, “A dynamic robust DL-based model for Android malware detection,” IEEE Access, vol. 9, pp. 74510–74521, 2021, doi: 10.1109/ACCESS.2021.3079370.

N. Zhang, Y. an Tan, C. Yang, and Y. Li, “Deep learning feature exploration for Android malware detection,” Applied Soft Computing, vol. 102, 2021, doi: 10.1016/j.asoc.2020.107069.

A. Pektaş and T. Acarman, “Deep learning for effective Android malware detection using API call graph embeddings,” Soft Computing, vol. 24, no. 2, pp. 1027–1043, 2020, doi: 10.1007/s00500-019-03940-5.

O. Aslan and R. Samet, “A comprehensive review on malware detection approaches,” IEEE Access, vol. 8, pp. 6249–6271, 2020, doi: 10.1109/ACCESS.2019.2963724.

J. Hemalatha, S. A. Roseline, S. Geetha, S. Kadry, and R. Damaševičius, “An efficient densenet‐based deep learning model for Malware detection,” Entropy, vol. 23, no. 3, 2021, doi: 10.3390/e23030344.

M. Chen, Q. Zhou, K. Wang, and Z. Zeng, “An Android malware detection method using deep learning based on multi-features,” 2022 IEEE International Conference on Artificial Intelligence and Computer Applications, ICAICA 2022, pp. 187–190, 2022, doi: 10.1109/ICAICA54878.2022.9844642.

E. C. Bayazit, O. K. Sahingoz, and B. Dogan, “A deep learning based android malware detection system with static analysis,” HORA 2022 - 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Proceedings, 2022, doi: 10.1109/HORA55278.2022.9800057.

A. Alzubaidi, “Sustainable android malware detection scheme using deep learning algorithm,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 12, pp. 860–867, 2021, doi: 10.14569/IJACSA.2021.01212104.

A. Lakshmanarao and M. Shashi, “Android malware detection with deep learning using rnn from opcode sequences,” International Journal of Interactive Mobile Technologies, vol. 16, no. 1, pp. 145–157, 2022, doi: 10.3991/IJIM.V16I01.26433.

Y. Liu, G. Li, and Z. Jin, “Call graph based android malware detection with CNN,” Communications in Computer and Information Science, vol. 861, pp. 72–82, 2019, doi: 10.1007/978-981-15-0310-8_5.

J. Kim, Y. Ban, E. Ko, H. Cho, and J. H. Yi, “MAPAS: a practical deep learning-based android malware detection system,” International Journal of Information Security, vol. 21, no. 4, pp. 725–738, 2022, doi: 10.1007/s10207-022-00579-6.

R. Feng, S. Chen, X. Xie, G. Meng, S. W. Lin, and Y. Liu, “A performance-sensitive malware detection system using deep learning on mobile devices,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1563–1578, 2021, doi: 10.1109/TIFS.2020.3025436.

I. Almomani, A. Alkhayer, and W. El-Shafai, “An automated vision-based deep learning model for efficient detection of android malware attacks,” IEEE Access, vol. 10, pp. 2700–2720, 2022, doi: 10.1109/ACCESS.2022.3140341.

R. M. Sharma and C. P. Agrawal, “MH-DLdroid: a meta-heuristic and deep learning-based hybrid approach for android malware detection,” International Journal of Intelligent Engineering and Systems, vol. 15, no. 4, pp. 425–435, 2022, doi: 10.22266/ijies2022.0831.38.

M. S. Akhtar and T. Feng, “Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time,” Symmetry, vol. 14, no. 11, 2022, doi: 10.3390/sym14112308.

N. Afifah and D. Stiawan, “The implementation of deep neural networks algorithm for malware classification,” Computer Engineering and Applications Journal, vol. 8, no. 3, pp. 189–202, 2019, doi: 10.18495/comengapp.v8i3.294.

R. B. Hadiprakoso, I. K. S. Buana, and Y. R. Pramadi, “Android malware detection using hybrid-based analysis deep neural network,” 2020 3rd International Conference on Information and Communications Technology, ICOIACT 2020, pp. 252–256, 2020, doi: 10.1109/ICOIACT50329.2020.9332066.

H. Il Kim, M. Kang, S. J. Cho, and S. Il Choi, “Efficient deep learning network with multi-streams for android malware family classification,” IEEE Access, vol. 10, pp. 5518–5532, 2022, doi: 10.1109/ACCESS.2021.3139334.

D. Stiawan et al., “An improved LSTM-PCA ensemble classifier for SQL injection and XSS attack detection,” Computer Systems Science and Engineering, vol. 46, no. 2, pp. 1759–1774, 2023, doi: 10.32604/csse.2023.034047.

T. L. Nikmah, J. Jumanto, B. Prasetiyo, N. Fitriani, and M. A. Muslim, “Deep learning model implementation using convolutional neural network algorithm for default P2P lending prediction,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, vol. 9, no. 3, pp. 802–809, Aug. 2023, doi: 10.26555/jiteki.v9i3.26366.

F. Fatimatuzzahra, L. Lindawati, and S. Soim, “Development of convolutional neural network models to improve facial expression recognition accuracy,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, vol. 10, no. 2, pp. 279–289, Jun. 2024, doi: 10.26555/jiteki.v10i2.28863.




DOI: https://doi.org/10.11591/csit.v6i1.p68-79

Refbacks

  • There are currently no refbacks.


Computer Science and Information Technologies
p-ISSN: 2722-323X, e-ISSN: 2722-3221
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Universitas Ahmad Dahlan (UAD).

CSIT Visitor Stats

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.