Skip to main content

2022 | OriginalPaper | Buchkapitel

Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders

verfasst von : Gianni D’Angelo, Francesco Palmieri, Antonio Robustelli

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The outbreak of the COVID-19 pandemic has forced worldwide employees to massive use of their mobile devices to access corporate systems. This new scenario has made mobile devices more susceptible to malicious applications, which are yearly developed to conduct several hostile activities. Concerned about this fact, many Deep Learning (DL) based solutions have been proposed, in the last decade, by considering both static and dynamic approaches. However, static solutions are adversely affected by obfuscation techniques and polymorphic applications, while dynamic ones cannot reduce the damages caused during applications execution. To this purpose, the following paper aims to propose a novel approach called API-Streams to minimize damages at Run-time. Therefore, we investigate several Video-Classification tasks through CNN-LSTM Autoencoders (CNN-LSTM-AEs). More precisely, we combine the capability of AEs in finding compact features with the classification abilities of Deep Neural Networks (DNNs), and we show that the proposed approach achieves an average accuracy of 98% in the presence of several unbalanced training datasets. Finally, we use the t-Stochastic Neighbor Embedded (t-SNE) representation technique to investigate the abilities of the employed AE to cluster data into their respective classes by limiting their overlapping.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
3.
Zurück zum Zitat Atienza, R.: Advanced Deep Learning with Keras : Apply Deep Learning Techniques, Autoencoders, GANs, Variational Autoencoders, Deep Reinforcement Learning, Policy Gradients, and More. Packt Publishing, Birmingham (2018) Atienza, R.: Advanced Deep Learning with Keras : Apply Deep Learning Techniques, Autoencoders, GANs, Variational Autoencoders, Deep Reinforcement Learning, Policy Gradients, and More. Packt Publishing, Birmingham (2018)
4.
Zurück zum Zitat Bhagwat, R., Abdolahnejad, M., Moocarme, M.: Applied Deep Learning with Keras: Solve Complex Real-life Problems with the Simplicity of Keras. Packt Publishing (2019) Bhagwat, R., Abdolahnejad, M., Moocarme, M.: Applied Deep Learning with Keras: Solve Complex Real-life Problems with the Simplicity of Keras. Packt Publishing (2019)
5.
Zurück zum Zitat D’Angelo, G., Rampone, S.: Shape-based defect classification for non destructive testing. In: 2015 IEEE Metrology for Aerospace (MetroAeroSpace), pp. 406–410 (2015) D’Angelo, G., Rampone, S.: Shape-based defect classification for non destructive testing. In: 2015 IEEE Metrology for Aerospace (MetroAeroSpace), pp. 406–410 (2015)
8.
Zurück zum Zitat David, O., Netanyahu, N.S.: Deepsign: deep learning for automatic malware signature generation and classification. In: 2015 International Joint Conference on Neural Networks (IJCNN), pp. 1–8 (2015) David, O., Netanyahu, N.S.: Deepsign: deep learning for automatic malware signature generation and classification. In: 2015 International Joint Conference on Neural Networks (IJCNN), pp. 1–8 (2015)
16.
Zurück zum Zitat Johnson, C., Khadka, B., Basnet, R.B., Doleck, T.: Towards detecting and classifying malicious URLS using deep learning. J. Wirel. Mobile Netw. Ubiquito. Comput. Dependable Appl. (JoWUA) 11(4), 31–48 (2020) Johnson, C., Khadka, B., Basnet, R.B., Doleck, T.: Towards detecting and classifying malicious URLS using deep learning. J. Wirel. Mobile Netw. Ubiquito. Comput. Dependable Appl. (JoWUA) 11(4), 31–48 (2020)
17.
Zurück zum Zitat Karamanolakis, G., Cherian, K.R., Narayan, A.R., Yuan, J., Tang, D., Jebara, T.: Item recommendation with variational autoencoders and heterogeneous priors. In: Proceedings of the 3rd Workshop on Deep Learning for Recommender Systems, DLRS 2018, pp. 10–14. Association for Computing Machinery, New York (2018). https://doi.org/10.1145/3270323.3270329 Karamanolakis, G., Cherian, K.R., Narayan, A.R., Yuan, J., Tang, D., Jebara, T.: Item recommendation with variational autoencoders and heterogeneous priors. In: Proceedings of the 3rd Workshop on Deep Learning for Recommender Systems, DLRS 2018, pp. 10–14. Association for Computing Machinery, New York (2018). https://​doi.​org/​10.​1145/​3270323.​3270329
18.
Zurück zum Zitat Kasturi, G., Jain, A., Singh, J.: Detection and classification of radio frequency jamming attacks using machine learning. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 49–62 (2020) Kasturi, G., Jain, A., Singh, J.: Detection and classification of radio frequency jamming attacks using machine learning. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 49–62 (2020)
19.
Zurück zum Zitat Kim, H.: 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. (JISIS) 10(2), 1–15 (2020) Kim, H.: 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. (JISIS) 10(2), 1–15 (2020)
22.
Zurück zum Zitat Lin, T.Y., Goyal, P., Girshick, R., He, K., Dollár, P.: Focal loss for dense object detection (2018) Lin, T.Y., Goyal, P., Girshick, R., He, K., Dollár, P.: Focal loss for dense object detection (2018)
27.
Zurück zum Zitat Makhzani, A., Frey, B.: k-sparse autoencoders (2014) Makhzani, A., Frey, B.: k-sparse autoencoders (2014)
28.
Zurück zum Zitat Manipriya, S., Mala, C., Mathew, S.: A collaborative framework for traffic information in vehicular adhoc network applications. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 93–109 (2020) Manipriya, S., Mala, C., Mathew, S.: A collaborative framework for traffic information in vehicular adhoc network applications. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 93–109 (2020)
29.
Zurück zum Zitat Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of android malware. J. Wirel. Mobile Netw. Ubiqui. Computi. Dependable Appl. (JoWUA) 11(3), 1–28 (2020) Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of android malware. J. Wirel. Mobile Netw. Ubiqui. Computi. Dependable Appl. (JoWUA) 11(3), 1–28 (2020)
33.
Zurück zum Zitat Onwuzurike, L., Mariconti, E., Andriotis, P., Cristofaro, E.D., Ross, G., Stringhini, G.: MaMaDroid: detecting android malware by building Markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. 22(2), 1–34 (2019). https://doi.org/10.1145/3313391CrossRef Onwuzurike, L., Mariconti, E., Andriotis, P., Cristofaro, E.D., Ross, G., Stringhini, G.: MaMaDroid: detecting android malware by building Markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. 22(2), 1–34 (2019). https://​doi.​org/​10.​1145/​3313391CrossRef
37.
Zurück zum Zitat Rifai, S., Vincent, P., Muller, X., Glorot, X., Bengio, Y.: Contractive auto-encoders: explicit invariance during feature extraction. In: Proceedings of the 28th International Conference on International Conference on Machine Learning, ICML’11, pp. 833–840. Omnipress, Madison (2011) Rifai, S., Vincent, P., Muller, X., Glorot, X., Bengio, Y.: Contractive auto-encoders: explicit invariance during feature extraction. In: Proceedings of the 28th International Conference on International Conference on Machine Learning, ICML’11, pp. 833–840. Omnipress, Madison (2011)
41.
Zurück zum Zitat van der Maaten, L., Hinton, G.: Visualizing high-dimensional data using T-SNE. J. Mach. Learn. Res. 9(Nov), 2579–2605 (2008). pagination: 27 van der Maaten, L., Hinton, G.: Visualizing high-dimensional data using T-SNE. J. Mach. Learn. Res. 9(Nov), 2579–2605 (2008). pagination: 27
46.
Zurück zum Zitat Xie, N., Zeng, F., Qin, X., Zhang, Y., Zhou, M., Lv, C.: RepassDroid: automatic detection of android malware based on essential permissions and semantic features of sensitive APIs. In: 2018 International Symposium on Theoretical Aspects of Software Engineering (TASE), pp. 52–59 (2018). https://doi.org/10.1109/TASE.2018.00015 Xie, N., Zeng, F., Qin, X., Zhang, Y., Zhou, M., Lv, C.: RepassDroid: automatic detection of android malware based on essential permissions and semantic features of sensitive APIs. In: 2018 International Symposium on Theoretical Aspects of Software Engineering (TASE), pp. 52–59 (2018). https://​doi.​org/​10.​1109/​TASE.​2018.​00015
47.
50.
Zurück zum Zitat Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, pp. 1105–1116. Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2660267.2660359 Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, pp. 1105–1116. Association for Computing Machinery, New York (2014). https://​doi.​org/​10.​1145/​2660267.​2660359
Metadaten
Titel
Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders
verfasst von
Gianni D’Angelo
Francesco Palmieri
Antonio Robustelli
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_13

Premium Partner