Mitigating the Risks of Malware Attacks with Deep Learning Techniques
-
Published:2023-07-21
Issue:14
Volume:12
Page:3166
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Alnajim Abdullah M.1ORCID, Habib Shabana1ORCID, Islam Muhammad2ORCID, Albelaihi Rana3, Alabdulatif Abdulatif4ORCID
Affiliation:
1. Department of Information Technology, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia 2. Department of Electrical Engineering, Unaizah College of Engineering, Qassim University, Buraydah 51452, Saudi Arabia 3. Department of Computer Science, College of Engineering and Information Technology, Onaizah Colleges, Onaizah 56447, Saudi Arabia 4. Department of Computer Science, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia
Abstract
Malware has become increasingly prevalent in recent years, endangering people, businesses, and digital assets worldwide. Despite the numerous techniques and methodologies proposed for detecting and neutralizing malicious agents, modern automated malware creation methods continue to produce malware that can evade modern detection techniques. This has increased the need for advanced and accurate malware classification and detection techniques. This paper offers a unique method for classifying malware, using images that use dual attention and convolutional neural networks. Our proposed model has demonstrated exceptional performance in malware classification, achieving the remarkable accuracy of 98.14% on the Malimg benchmark dataset. To further validate its effectiveness, we also evaluated the model’s performance on the big 2015 dataset, where it achieved an even higher accuracy rate of 98.95%, surpassing previous state-of-the-art solutions. Several metrics, including the precision, recall, specificity, and F1 score were used to evaluate accuracy, showing how well our model performed. Additionally, we used class-balancing strategies to increase the accuracy of our model. The results obtained from our experiments indicate that our suggested model is of great interest, and can be applied as a trustworthy method for image-based malware detection, even when compared to more complex solutions. Overall, our research highlights the potential of deep learning frameworks to enhance cyber security measures, and mitigate the risks associated with malware attacks.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference71 articles.
1. Automatic analysis of malware behavior using machine learning;Rieck;J. Comput. Secur.,2011 2. Awan, M.J., Masood, O.A., Mohammed, M.A., Yasin, A., Zain, A.M., Damaševičius, R., and Abdulkareem, K.H. (2021). Image-based malware classification using VGG19 network and spatial convolutional attention. Electronics, 10. 3. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., and Kirda, E. (2015). Detection of Intrusions and Malware, and Vulnerability Assessment, Proceedings of the 12th International Conference, DIMVA 2015, Milan, Italy, 9–10 July 2015, Springer. 4. 1 Blockchain’s roles in meeting key supply chain management objectives;Kshetri;Int. J. Inf. Manag.,2018 5. The Internet of Things vision: Key features, applications and open issues;Borgia;Comput. Commun.,2014
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|