Journal Articles (All Issues)

AN ENSEMBLE APPROACH LEVERAGING CONVENTIONAL MACHINE LEARNING ALGORITHMS FOR OBFUSCATED MALWARE DETECTION

Authors

Lingaraj Sethi author1*, Dr Prof Prashanta Kumar Patra2

Keyword Malware detection, Ensemble model, Machine learning, Gradient Boosting, Logistic regression

Abstract

Static and dynamic analysis are the two categories into which malware detection techniques can be divided. Each class's conventional methods have benefits and drawbacks of their own. For instance, although dynamic analysis is slower and needs more resources, it can detect malware variants created through code obfuscation more successfully than static analysis, which is faster but unable to do so. In this research, a novel ensemble model for malware detection is proposed that mitigate above discussed problem. Gradient Boosting (GB), Support Vector Machine (SVM), AdaBoost and Logistic regression (LR) are integrated to form an ensemble model. Initially a dataset known as CIC-Malmem 2022 is used for training and testing of the ensemble model. Term frequency-inverse document frequency (TF-IDF) technique is used to extract vectorized features in malware detection followed by preprocessing of the data. After this the least absolute shrinkage and selection operator(LASSO) tool is used to select the important features from the extracted features. Based on the selected features the ensemble model is trained and tested for performance evaluation. Finally, the result shows that as compared to individual classification of machine learning (ML) model. the classification performed by ensemble model is much accurate as the overall classification accuracy of the ensemble model is 99.99%. The proposed ensemble model is also contrasted with earlier developed hybrid model on the basis of accuracy and result shows that the suggested model outperformed the earlier developed model.

References

    [1]. Frumento, Enrico. "Cybersecurity and the evolutions of healthcare: challenges and threats behind its evolution." M_Health current and future applications (2019): 35-69. [2]. Maniriho, Pascal, Abdun Naser Mahmood, and Mohammad Jabed Morshed Chowdhury. "A study on malicious software behavior analysis and detection techniques: Taxonomy, current trends and challenges." Future Generation Computer Systems 130 (2022): 1-18. [3]. Perera, Srinath, Xiaohua Jin, Alana Maurushat, and De-Graft Joe Opoku. "Factors affecting reputational damage to organisations due to cyberattacks." In Informatics, vol. 9, no. 1, p. 28. MDPI, 2022. [4]. Zotti, Moises, Ericmar Avila Dos Santos, Deise Cagliari, Olivier Christiaens, Clauvis Nji Tizi Taning, and Guy Smagghe. "RNA interference technology in crop protection against arthropod pests, pathogens and nematodes." Pest management science 74, no. 6 (2018): 1239-1250. [5]. Chakkaravarthy, S. Sibi, Dhamodara Sangeetha, and V. Vaidehi. "A survey on malware analysis and mitigation techniques." Computer Science Review 32 (2019): 1-23. [6]. Pompura, Mike. "Improved Detection of Multi-Faceted Polymorphic Malware." PhD diss., Florida Institute of Technology, 2021. [7]. Nazir, Ahsan, Jingsha He, Nafei Zhu, Ahsan Wajahat, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, and Muhammad Salman Pathan. "Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets." Journal of King Saud University-Computer and Information Sciences (2023): 101820. [8]. Injadat, MohammadNoor, Abdallah Moubayed, Ali Bou Nassif, and Abdallah Shami. "Machine learning towards intelligent systems: applications, challenges, and opportunities." Artificial Intelligence Review 54 (2021): 3299-3348. [9]. Yan, Jinpei, Yong Qi, and Qifan Rao. "Detecting malware with an ensemble method based on deep neural network." Security and Communication Networks 2018 (2018). [10]. Hassan, Syed Khurram, and Asif Ibrahim. "The role of Artificial Intelligence in Cyber Security and Incident Response." International Journal for Electronic Crime Investigation 7, no. 2 (2023). [11]. Broadhead, Stearns. "The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments." Computer Law & Security Review 34, no. 6 (2018): 1180-1196. [12]. Caviglione, Luca, Michał Choraś, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, and Katarzyna Wasielewska. "Tight arms race: Overview of current malware threats and trends in their detection." IEEE Access 9 (2020): 5371-5396. [13]. Sahay, Sanjay K., Ashu Sharma, and Hemant Rathore. "Evolution of malware and its detection techniques." In Information and Communication Technology for Sustainable Development: Proceedings of ICT4SD 2018, pp. 139-150. Springer Singapore, 2020. [14]. Alenezi, Mohammed N., Haneen Alabdulrazzaq, Abdullah A. Alshaher, and Mubarak M. Alkharang. "Evolution of malware threats and techniques: A review." International journal of communication networks and information security 12, no. 3 (2020): 326-337. [15]. HosseiniNejad, Reyhaneh, Hamed HaddadPajouh, Ali Dehghantanha, and Reza M. Parizi. "A cyber kill chain based analysis of remote access trojans." Handbook of big data and iot security (2019): 273-299. [16]. Mayers, Justin. "The Importance of Ransomware Threat Protection & Recovery." PhD diss., Utica College, 2021. [17]. Ngo, Fawn T., Anurag Agarwal, Ramakrishna Govindu, and Calen MacDonald. "Malicious software threats." The Palgrave Handbook of International Cybercrime and Cyberdeviance (2020): 793-813. [18]. Kanwar, Akshay Kumar. "An analysis of Key Logger." (2023). [19]. Vasani, Vatsal, Amit Kumar Bairwa, Sandeep Joshi, Anton Pljonkin, Manjit Kaur, and Mohammed Amoon. "Comprehensive Analysis of Advanced Techniques and Vital Tools for Detecting Malware Intrusion." Electronics 12, no. 20 (2023): 4299. [20]. Khalid, Osama, Subhan Ullah, Tahir Ahmad, Saqib Saeed, Dina A. Alabbad, Mudassar Aslam, Attaullah Buriro, and Rizwan Ahmad. "An insight into the machine-learning-based fileless malware detection." Sensors 23, no. 2 (2023): 612. [21]. Mohammadzad, Maryam, and Jaber Karimpour. "Using rootkits hiding techniques to conceal honeypot functionality." Journal of Network and Computer Applications 214 (2023): 103606. [22]. Sarker, Iqbal H. "Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects." Annals of Data Science (2022): 1-26. [23]. Al-amri, Redhwan, Raja Kumar Murugesan, Mustafa Man, Alaa Fareed Abdulateef, Mohammed A. Al-Sharafi, and Ammar Ahmed Alkahtani. "A review of machine learning and deep learning techniques for anomaly detection in IoT data." Applied Sciences 11, no. 12 (2021): 5320. [24]. Bharadiya, Jasmin. "Machine Learning in Cybersecurity: Techniques and Challenges." European Journal of Technology 7, no. 2 (2023): 1-14. [25]. Upman, Vikas, Nikolaj Goranin, and Antanas Čenys. "Convolutional neural network approach for anomaly-based intrusion detection on IoT-enabled smart space orchestration system." In DAMSS 2022: 13th conference on data analysis methods for software systems, Druskininkai, Lithuania, December 1–3, 2022. Vilniaus universitetas, 2022. [26]. Roy, Kowshik Sankar, Tanim Ahmed, Pritom Biswas Udas, Md Ebtidaul Karim, and Sourav Majumdar. "MalHyStack: A hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis." Intelligent Systems with Applications 20 (2023): 200283. [27]. Alomari, Esraa Saleh, Riyadh RahefNuiaa, Zaid Abdi AlkareemAlyasseri, Husam Jasim Mohammed, Nor Samsiah Sani, Mohd Isrul Esa, and Bashaer Abbuod Musawi. "Malware detection using deep learning and correlation-based feature selection." Symmetry 15, no. 1 (2023): 123. [28]. Panda, Pratyush, Om Kumar CU, Suguna Marappan, Suresh Ma, and Deeksha Veesani Nandi. "Transfer Learning for Image-Based Malware Detection for IoT." Sensors 23, no. 6 (2023): 3253. [29]. Masum, Mohammad, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, and Muhaiminul Islam Adnan. "Ransomware classification and detection with machine learning algorithms." In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0316-0322. IEEE, 2022. [30]. Akhtar, Muhammad Shoaib, and Tao Feng. "Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time." Symmetry 14, no. 11 (2022): 2308. [31]. Shatnawi, Ahmed S., Aya Jaradat, Tuqa Bani Yaseen, Eyad Taqieddin, Mahmoud Al-Ayyoub, and Dheya Mustafa. "An Android malware detection leveraging machine learning." Wireless Communications and Mobile Computing 2022 (2022). [32]. Tian, Donghai, Qianjin Ying, Xiaoqi Jia, Rui Ma, Changzhen Hu, and Wenmao Liu. "MDCHD: A novel malware detection method in cloud using hardware trace and deep learning." Computer Networks 198 (2021): 108394. [33]. Abusitta, Adel, Talal Halabi, and Omar Abdel Wahab. "ROBUST: Deep learning for malware detection under changing environments." In AIofAI’21: 1st Workshop on Adverse Impacts and Collateral Effects of Artificial Intelligence Technologies, pp. 1-13. CEUR Workshop Proceedings, 2021. [34]. Basnet, Manoj, Subash Poudyal, Mohd Hasan Ali, and Dipankar Dasgupta. "Ransomware detection using deep learning in the SCADA system of electric vehicle charging station." In 2021 IEEE PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), pp. 1-5. IEEE, 2021. [35]. Liu, Xinbo, Yaping Lin, He Li, and Jiliang Zhang. "A novel method for malware detection on ML-based visualization technique." Computers & Security 89 (2020): 101682. [36]. Feng, Ruitao, Sen Chen, Xiaofei Xie, Lei Ma, Guozhu Meng, Yang Liu, and Shang-Wei Lin. "Mobidroid: A performance-sensitive malware detection system on mobile platform." In 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 61-70. IEEE, 2019. [37]. Somesha, M., and Alwyn R. Pais. "Classification of Phishing Email Using Word Embedding and Machine Learning Techniques." Journal of Cyber Security and Mobility (2022): 279-320. [38]. Madanan, Mukesh, and Anita Venugopal. "Designing a Hybrid Model Using HSIC Lasso Feature Selection and AdaBoost Classifier to Classify Image Data in Biomedicine." International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies 12, no. 1 (2021): 1-14. [39]. Kumarage, Prabha M., B. Yogarajah, and Nagulan Ratnarajah. "Efficient feature selection for prediction of diabetic using LASSO." In 2019 19th International Conference on Advances in ICT for Emerging Regions (ICTer), vol. 250, pp. 1-7. IEEE, 2019.

Downloads

View/Download PDF

PDF



Published

2024-01-30

Issue

Vol. 43 No. 01 (2024)