Affiliation:
1. College of Education Pure Sciences, University of Anbar, Anbar 55431, Iraq
2. College of Computer Sciences and Information Technology, University of Anbar, Anbar 55431, Iraq
Abstract
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware detection performance, such as inappropriate features and classifiers, extensive domain knowledge, imbalanced data environments, computational complexity, and resource usage. A significant number of existing malware detection methods have been impacted by these factors. Therefore, in this paper, we will first identify and determine the best features and classifiers and then use them in order to propose the malware detection method. The comparative strategy and proposed malware detection procedure consist of four basic steps: malware transformation (converting images of malware from RGB to grayscale), feature extraction (using the ResNet-50, DenseNet-201, GoogLeNet, AlexNet, and SqueezeNet models), feature selection (using PCA method), classification (including GDA, KNN, logistic, SVM, RF, and ensemble learning), and evaluation (using accuracy and error evaluation metrics). Unbalanced Malimg datasets are used in experiments to validate the efficacy of the results that were obtained. According to the comparison findings, KNN is the best machine learning classifier. It outperformed the other classifiers in the Malimg datasets in terms of both accuracy and error. In addition, DenseNet201 is the best pretrained model in the Malimg dataset. Therefore, the proposed DenseNet201-KNN methods had an accuracy rate of 96% and a minimal error rate of 3.07%. The proposed methods surpass existing state-of-the-art approaches. The proposed feature extraction is computationally quicker than most other methods since it uses a lightweight design and fewer feature vector dimensions.
Reference57 articles.
1. Poudyal, S., Akhtar, Z., Dasgupta, D., and Gupta, K.D. (2019, January 6–9). Malware analytics: Review of data mining, machine learning and big data perspectives. Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen, China.
2. Implementation of lightweight cryptographic primitives;Hammad;J. Theor. Appl. Inf. Technol.,2017
3. Dynamic analysis of malicious code;Bayer;J. Comput. Virol.,2006
4. Ahmed, I.T., Jamil, N., Din, M.M., and Hammad, B.T. (2022). Binary and Multi-Class Malware Threads Classification. Appl. Sci., 12.
5. Recommendation system based on deep learning methods: A systematic review and new directions;Salim;Artif. Intell. Rev.,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Malware Detection Using Dual Siamese Network Model;Computer Modeling in Engineering & Sciences;2024