Document Type : Original/Review Paper

Authors

Department of Computer Science, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran.

Abstract

Detecting and preventing malware infections in systems is become a critical necessity. This paper presents a hybrid method for malware detection, utilizing data mining algorithms such as simulated annealing (SA), support vector machine (SVM), genetic algorithm (GA), and K-means. The proposed method combines these algorithms to achieve effective malware detection. Initially, the SA-SVM method is employed for feature selection, where the SVM algorithm identifies the best features, and the SA algorithm calculates the SVM parameters. Subsequently, the GA-K-means method is utilized to identify attacks. The GA algorithm selects the best chromosome for cluster centers, and the K-means algorithm has applied to identify malware. To evaluate the performance of the proposed method, two datasets, Andro-Autopsy and CICMalDroid 2020, have been utilized. The evaluation results demonstrate that the proposed method achieves high true positive rates (0.964, 0.985), true negative rates (0.985, 0.989), low false negative rates (0.036, 0.015), and false positive rates (0.022, 0.043). This indicates that the method effectively detects malware while reasonably minimizing false identifications.

Keywords

Main Subjects

[1] H. Alamro, W. Mtouaa, S. Aljameel, A.S. Salama, M.A. Hamza, and A.Y. Othman, "Automated android malware detection using optimal ensemble learning approach for cybersecurity," IEEE Access, 2023.
[2] R. Yumlembam, B. Issac, S.M. Jacob, and L. Yang, "Iot-based android malware detection using graph neural network with adversarial defense," IEEE Internet of Things Journal, 2022.
[3] J. Kim, Y. Ban, E. Ko, H. Cho, and J.H. Yi, "MAPAS: a practical deep learning-based android malware detection system," International Journal of Information Security, vol. 21, no. 4, pp. 725-738, 2022.
[4] R. Morshedi, S.M. Matinkhah, and M.T. Sadeghi. "Intrusion Detection for IoT Network Security with Deep learning." Journal of AI and Data Mining (2024).
[5] A. Anand, S. Rani, D. Anand, H. M. Aljahdali, and D. Kerr, "An efficient CNN-based deep learning model to detect malware attacks (CNN-DMA) in 5G-IoT healthcare applications," Sensors, vol. 21, no. 19, pp. 6346, 2021.
[6] J. Lee, H. Jang, S. Ha, and Y. Yoon, "Android malware detection using machine learning with feature selection based on the genetic algorithm," Mathematics, vol. 9, no. 21, pp. 2813, 2021.
[7] M. Yang, X. Chen, Y. Luo, and H. Zhang, "An android malware detection model based on dt-svm," Security and Communication Networks, vol. 2020, pp. 1-11, 2020.
[8] S.W. Lin, Z.J. Lee, S.C. Chen, and T.Y. Tseng, "Parameter determination of support vector machine and feature selection using simulated annealing approach," Applied soft computing, vol. 8, no. 4, pp. 1505-1512, 2008.
[9] K. Krishna and M.N. Murty, "Genetic K-means algorithm," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 29, no. 3, pp. 433-439, 1999.
[10] K. Sharma and B.B. Gupta, "Mitigation and risk factor analysis of android applications," Computers & Electrical Engineering, vol. 71, pp. 416-430, 2018.
[11] D. Aboshady, N.E. Ghannam, E.K. Elsayed, and L. Diab, "APKOWL: An Automatic Approach to Enhance the Malware Detection," Mobile Networks and Applications, pp. 1-12, 2023.
[12] H.H.R. Manzil and S. Manohar Naik, "Android malware category detection using a novel feature vector-based machine learning model," Cybersecurity, vol. 6, no. 1, p. 6, 2023.
[13] C. Avci, B. Tekinerdogan, and C. Catal, "Analyzing the performance of long short‐term memory architectures for malware detection models," Concurrency and Computation: Practice and Experience, vol. 35, no. 6, pp. 1-1, 2023.
[14] V.Lavanya and P.C. Sekhar, "Efficient Cybersecurity Model Using Wavelet Deep CNN and Enhanced Rain Optimization Algorithm," International Journal of Image and Graphics, p. 2450048, 2023.
[15] J.L. Potharlanka, "Feature importance feedback with Deep Q process in ensemble-based metaheuristic feature selection algorithms," Scientific Reports, vol. 14, no. 1, p. 2923, 2024.
[16] P. K. Keserwani, M.C. Govil, and E.S. Pilli, "An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques," Neural Computing and Applications, vol. 35, no. 7, pp. 4993-5013, 2023.
[17] F. Taher, O. AlFandi, M. Al-kfairy, H. Al Hamadi, and S. Alrabaee, "DroidDetectMW: A Hybrid Intelligent Model for Android Malware Detection," Applied Sciences, vol. 13, no. 13, p. 7720, 2023.