International Journal of Advances in Applied Computational Intelligence

Journal DOI

https://doi.org/10.54216/IJAACI

Submit Your Paper

2833-5600ISSN (Online)

Volume 1 , Issue 2 , PP: 46-55, 2022 | Cite this article as | XML | Html | PDF | Full Length Article

Deep Learning Defenders: Harnessing Convolutional Networks for Malware Detection

Ahmed Abdelmonem 1 * , Shimaa S. Mohamed 2

  • 1 Faculty of Computers and Informatics, Zagazig University, Zagazig 44519, Sharqiyah, Egypt - (aabdelmounem@zu.edu.eg)
  • 2 Faculty of Computers and Informatics, Zagazig University, Zagazig 44519, Sharqiyah, Egypt - (shimaa_said@zu.edu.eg)
  • Doi: https://doi.org/10.54216/IJAACI.010203

    Received: January 15, 2022 Accepted: May 23, 2022
    Abstract

    Malware attacks continue to pose a significant threat to computer systems and networks worldwide. Traditional signature-based malware detection methods have proven to be insufficient in detecting the increasing number of sophisticated malware variants. This has led to the exploration of new approaches, including machine learning-based techniques. In this paper, we propose a novel approach to malware detection using residually connect convolutional networks. We demonstrate the effectiveness of our approach by training CNN on a large dataset of malware samples and benign files and evaluating its performance on a separate test set. Extensive experiments on a public dataset of malware images demonstrated that our model could achieve high accuracy in detecting both known and unknown malware samples. The findings suggest that our residual convolution has great potential for improving malware detection and enhancing the security of computer systems and networks.

    Keywords :

    Computational Intelligence , Deep Learning , Convolutional Neural Networks , Malware Detection ,   , Machine Learning.

    References

    [1] Liu, Kaijun, et al. "A review of android malware detection approaches based on machine learning." IEEE Access 8 (2020): 124579-124607.

    [2] Anderson, Hyrum S., et al. "Evading machine learning malware detection." black Hat 2017 (2017).

    [3] Allix, Kevin, et al. "Are your training datasets yet relevant? an investigation into the importance of timeline in machine learning-based malware detection." Engineering Secure Software and Systems: 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings 7. Springer International Publishing, 2015.

    [4] Alqahtani, Ebtesam J., Rachid Zagrouba, and Abdullah Almuhaideb. "A survey on android malware detection techniques using machine learning algorithms." 2019 Sixth International Conference on Software Defined Systems (SDS). IEEE, 2019.

    [5] Sahs, Justin, and Latifur Khan. "A machine learning approach to android malware detection." 2012 European intelligence and security informatics conference. IEEE, 2012.

    [6] Sethi, Kamalakanta, et al. "A novel machine learning based malware detection and classification framework." 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2019.

    [7] Demontis, Ambra, et al. "Yes, machine learning can be more secure! a case study on android malware detection." IEEE transactions on dependable and secure computing 16.4 (2017): 711-724.

    [8] Liu, Liu, et al. "Automatic malware classification and new malware detection using machine learning." Frontiers of Information Technology & Electronic Engineering 18.9 (2017): 1336-1347.

    [9] Firdausi, Ivan, Alva Erwin, and Anto Satriyo Nugroho. "Analysis of machine learning techniques used in behavior-based malware detection." 2010 second international conference on advances in computing, control, and telecommunication technologies. IEEE, 2010.

    [10] Firdausi, Ivan, Alva Erwin, and Anto Satriyo Nugroho. "Analysis of machine learning techniques used in behavior-based malware detection." 2010 second international conference on advances in computing, control, and telecommunication technologies. IEEE, 2010.

    [11] Rathore, Hemant, et al. "Malware detection using machine learning and deep learning." Big Data Analytics: 6th International Conference, BDA 2018, Warangal, India, December 18–21, 2018, Proceedings 6. Springer International Publishing, 2018.

    [12] GavriluĊ£, DragoĊŸ, et al. "Malware detection using machine learning." 2009 International multiconference on computer science and information technology. IEEE, 2009.

    [13] Narudin, Fairuz Amalina, et al. "Evaluation of machine learning classifiers for mobile malware detection." Soft Computing 20 (2016): 343-357.

    [14] Li, Jin, et al. "Significant permission identification for machine-learning-based android malware detection." IEEE Transactions on Industrial Informatics 14.7 (2018): 3216-3225.

    [15] Amos, Brandon, Hamilton Turner, and Jules White. "Applying machine learning classifiers to dynamic android malware detection at scale." 2013 9th international wireless communications and mobile computing conference (IWCMC). IEEE, 2013.

    [16] Yerima, Suleiman Y., Sakir Sezer, and Igor Muttik. "Android malware detection using parallel machine learning classifiers." 2014 Eighth international conference on next generation mobile apps, services and technologies. IEEE, 2014.

    [17] Peiravian, Naser, and Xingquan Zhu. "Machine learning for android malware detection using permission and api calls." 2013 IEEE 25th international conference on tools with artificial intelligence. IEEE, 2013.

    [18] Kolosnjaji, Bojan, et al. "Adversarial malware binaries: Evading deep learning for malware detection in executables." 2018 26th European signal processing conference (EUSIPCO). IEEE, 2018.

    [19] Ham, Hyo-Sik, and Mi-Jung Choi. "Analysis of android malware detection performance using machine learning classifiers." 2013 international conference on ICT Convergence (ICTC). Ieee, 2013.

    [20] Sewak, Mohit, Sanjay K. Sahay, and Hemant Rathore. "Comparison of deep learning and the classical machine learning algorithm for the malware detection." 2018 19th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). IEEE, 2018.

    [21] Targ, Sasha, Diogo Almeida, and Kevin Lyman. "Resnet in resnet: Generalizing residual architectures." arXiv preprint arXiv:1603.08029 (2016).

    Cite This Article As :
    Abdelmonem, Ahmed. , S., Shimaa. Deep Learning Defenders: Harnessing Convolutional Networks for Malware Detection. International Journal of Advances in Applied Computational Intelligence, vol. , no. , 2022, pp. 46-55. DOI: https://doi.org/10.54216/IJAACI.010203
    Abdelmonem, A. S., S. (2022). Deep Learning Defenders: Harnessing Convolutional Networks for Malware Detection. International Journal of Advances in Applied Computational Intelligence, (), 46-55. DOI: https://doi.org/10.54216/IJAACI.010203
    Abdelmonem, Ahmed. S., Shimaa. Deep Learning Defenders: Harnessing Convolutional Networks for Malware Detection. International Journal of Advances in Applied Computational Intelligence , no. (2022): 46-55. DOI: https://doi.org/10.54216/IJAACI.010203
    Abdelmonem, A. , S., S. (2022) . Deep Learning Defenders: Harnessing Convolutional Networks for Malware Detection. International Journal of Advances in Applied Computational Intelligence , () , 46-55 . DOI: https://doi.org/10.54216/IJAACI.010203
    Abdelmonem A. , S. S. [2022]. Deep Learning Defenders: Harnessing Convolutional Networks for Malware Detection. International Journal of Advances in Applied Computational Intelligence. (): 46-55. DOI: https://doi.org/10.54216/IJAACI.010203
    Abdelmonem, A. S., S. "Deep Learning Defenders: Harnessing Convolutional Networks for Malware Detection," International Journal of Advances in Applied Computational Intelligence, vol. , no. , pp. 46-55, 2022. DOI: https://doi.org/10.54216/IJAACI.010203