A semantic malware detection model based on the GMDH neural networks

Abstract There are several approaches for preventing mobile devices from malware intrusion, but most of them suffer from the insufficient accuracy required for detecting Trojan malware. A combination of semantic and machine learning techniques can be effective in preventing intrusions. In this paper, we have used a hierarchical semantic approach to convert numerical and string data to meaningful values, Subgraph Semantic Homomorphism Coefficient (SSHC) to select optimal features, and Group Method of Data Handling (GMDH) deep neural network (DNN) algorithm to detect malware via a cloud-computing infrastructure. To evaluate our model, Android Trojan Dataset has been used. After evaluation, the accuracy reached 99.91%, which was improved by about 5.25% compared to StormDroid, Drebin, and KuafuDet models. Also, the accuracy was improved by about 10.4% and 31.9% compared to machine learning based approaches of Random Forest (RF), Support Vector Machine (SVM), and K-Nearest Neighbor (KNN), in the state-of-the-art KuafuDet model, respectively.

[1]  Giovanni Squillero,et al.  The Maximum Common Subgraph Problem: A Parallel and Multi-Engine Approach , 2020, Comput..

[2]  Seunghyun Park,et al.  Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms , 2020 .

[3]  Rajeswari Mukesh,et al.  Detection of Malware Attacks on Virtual Machines for a Self-Heal Approach in Cloud Computing using VM Snapshots , 2018, Journal of Communications Software and Systems.

[4]  Dejan S. Milojicic,et al.  A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade , 2018 .

[5]  Yuval Elovici,et al.  Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments , 2020, Neural Networks.

[6]  Wei Zhang,et al.  Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware , 2016, IEEE Transactions on Information Forensics and Security.

[7]  Huda Karajeh,et al.  Privacy and Security Issues of Cloud Computing Environment , 2016 .

[8]  A. Adamian,et al.  Estimation of contact heat transfer between curvilinear contacts using inverse method and group method of data handling (GMDH)-type neural networks , 2020 .

[9]  Sanjay Chakraborty,et al.  Cloud Based Malware Detection Technique , 2016, FICTA.

[10]  Rajkumar Buyya,et al.  Brownout Approach for Adaptive Management of Resources and Applications in Cloud Computing Systems , 2019, ACM Comput. Surv..

[11]  Rita Almeida Ribeiro,et al.  Normalization Techniques for Multi-Criteria Decision Making: Analytical Hierarchy Process Case Study , 2016, DoCEIS.

[12]  Liang Xiao,et al.  Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.

[13]  Bo Li,et al.  Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach , 2017, Comput. Secur..

[14]  Vijay Varadharajan,et al.  Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..

[15]  Preeti Mishra,et al.  KVMInspector: KVM Based introspection approach to detect malware in cloud environment , 2020, J. Inf. Secur. Appl..

[16]  Muttukrishnan Rajarajan,et al.  Employing Program Semantics for Malware Detection , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Latifa Ben Arfa Rabai,et al.  A Security Framework for Secure Cloud Computing Environments , 2016, Int. J. Cloud Appl. Comput..

[18]  Giovanni Squillero,et al.  The Maximum Common Subgraph Problem: A Portfolio Approach , 2019, ArXiv.

[19]  Rajkumar Buyya,et al.  CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices , 2017, Softw. Pract. Exp..

[20]  Rajkumar Buyya,et al.  Augmentation Techniques for Mobile Cloud Computing , 2018, ACM Comput. Surv..

[21]  Syed Waqar Jaffry,et al.  Data mining for smart legal systems , 2019, Comput. Electr. Eng..

[22]  Andres Navarro Cadavid,et al.  Machine learning classifiers for android malware analysis , 2016, 2016 IEEE Colombian Conference on Communications and Computing (COLCOM).

[23]  Abdelouahid Derhab,et al.  Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..

[24]  Shedden Masupe,et al.  Analysis of internet of things malware using image texture features and machine learning techniques , 2020, Internet Things.

[25]  Ram Mahesh Yadav,et al.  Effective analysis of malware detection in cloud computing , 2019, Comput. Secur..