Detecting Android malware using Long Short-term Memory (LSTM)

被引:87
作者
Vinayakumar, R. [1 ]
Soman, K. P. [1 ]
Poornachandran, Prabaharan [2 ]
Kumar, S. Sachin [1 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Ctr Computat Engn & Networking CEN, Coimbatore, Tamil Nadu, India
[2] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Ctr Cyber Secur & Networks, Amritapuri, Tamil Nadu, India
关键词
Android malware detection: static and dynamic analysis; deep learning: recurrent neural network (RNN); Long Short-term Memory (LSTM);
D O I
10.3233/JIFS-169424
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Long Short-term Memory (LSTM) is a sub set of recurrent neural network (RNN) which is specifically used to train to learn long-term temporal dynamics with sequences of arbitrary length. In this paper, long short-term memory (LSTM) architecture is followed for Android malware detection. The data set for evaluation contains real known benign and malware applications from static and dynamic analysis. To achieve acceptable malware detection rates with low computational cost, various LSTM network topologies with several network parameters are used on all extracted features. A stacked LSTM with 32 memory blocks containing one cell each has performed well on detection of all individual behaviors of malicious applications in comparison to other traditional static machine learning classifier. The architecture quantifies experimental results up to 1000 epochs with learning rate 0.1. This is primarily due to the reason that LSTM has the potential to store long-range dependencies across time-steps and to correlate with successive connection sequences information. The experiment achieved the Android malware detection of 0.939 on dynamic analysis and 0.975 on static analysis on well-known datasets.
引用
收藏
页码:1277 / 1288
页数:12
相关论文
共 38 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
Amos B, 2013, INT WIREL COMMUN, P1666, DOI 10.1109/IWCMC.2013.6583806
[3]  
[Anonymous], THESIS
[4]  
[Anonymous], 2014, CISC 2014 ANN SEC RE
[5]  
[Anonymous], J SYSTEMS SOFTWARE
[6]  
[Anonymous], 2015, BLACKHAT US
[7]  
[Anonymous], 1997, Neural Computation
[8]  
[Anonymous], COMPUTER SECURITY
[9]  
[Anonymous], 2015, South African Computer Journal, DOI DOI 10.18489/SACJ.V56I1.248
[10]  
[Anonymous], KNOWLEDGE INFORM CRE