Abstract
Malware refers to malicious software developed to penetrate or damage a computer system without any owner’s informed consent. It uses target system susceptibilities, like bugs in legitimate software that can be harmed. For dealing with the new malware, new approaches have been developed to identify and prevent any damage caused. The recent advances in Deep Learning (DL) models are useful for malware detection because they are trained via feature learning instead of task-specific approaches. This paper presents an Optimal Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification (OELSTM-MDC) technique. The presented OELSTM-MDC technique involves the identification and classification of malware. To accomplish this, the OELSTM-MDC model applies pre-processing in the initial stage for data normalization. In addition, Quantum Mayfly Optimization-based Feature Selection (QMFO-FS) approach is derived from choosing an optimal subset of features. Finally, the Butterfly Optimization Algorithm (BOA) is employed for optimal hyperparameter tuning of the ELSTM model. A wide range of empirical analysis is investigated on benchmark datasets to assess the better malware classification performance of the OELSTM-MDC model. It is also compared with the conventional machine learning models such as Random Forest, XGBoost, support vector machine, etc. According to the comparison studies, the OELSTM-MDC model outperformed conventional techniques by detecting the malware class and benign class with accuracy of 97.14% and 98.33% based on the training and testing datasets.
Similar content being viewed by others
Data Availability
Not applicable.
References
Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115. https://doi.org/10.1016/j.jnca.2016.11.027
Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol
Gibert D, Mateu C, Planes J (2020) The rise of machine learning for detection and classification of malware: research developments, trends and challenges. J Netw Comput Appl 153(C). https://doi.org/10.1016/j.jnca.2019.102526
Chakraborty A, Alam M, Dey V, Chattopadhyay A, Mukhopadhyay D (2021) A survey on adversarial attacks and defences. CAAI Transactions on Intelligence Technology 6(1):25–45
Shhadat I, Bataineh B, Hayajneh A, Al-Sharif ZA (2020) The use of machine learning techniques to advance the detection and classification of unknown malware. Procedia Comput Sci 170:917–922. https://doi.org/10.1016/j.procs.2020.03.110
Chen T, Mao Q, Yang Y, Lv M, Zhu J (2018) Tinydroid: a lightweight and efficient model for android malware detection and classification. Mob Inf Syst 2018:1–9. https://doi.org/10.1155/2018/4157156
Alzubi OA, Alzubi JA, Al-Zoubi AM, Hassonah MA, KÖSE U (2022) An efficient malware detection approach with feature weighting based on harris hawks optimization. Clust Comput 25:2369–2387. https://doi.org/10.1007/s10586-021-03459-1
Roseline SA, Geetha S, Kadry S, Nam Y (2020) Intelligent vision-based malware detection and classification using deep random forest paradigm. IEEE Access 8:206303–206324. https://doi.org/10.1109/ACCESS.2020.3036491
Vu LN, Jung S (2021) Admat: a cnn-on-matrix approach to android malware detection and classification. IEEE Access 9:39680–39694. https://doi.org/10.1109/ACCESS.2021.3063748
Mahmood T, Ali Z (2022) Prioritized muirhead mean aggregation operators under the complex single-valued neutrosophic settings and their application in multi-attribute decision-making. J Comput Cogn Eng:56–73
Alamleh A, Albahri O, Zaidan A, Alamoodi A, Albahri A, Zaidan B, Qahtan S, Binti Ismail AR, Malik R, Baqer M et al (2022) Multi-attribute decision-making for intrusion detection systems: a systematic review. Int J Inf Technol Decis Mak:1–48
Alzubi OA (2022) Quantum readout and gradient deep learning model for secure and sustainable data access in iwsn. PeerJ Comput Sci 8:983–1007. https://doi.org/10.7717/peerj-cs.983
Yakici E, Karatas M (2021) Solving a multi-objective heterogeneous sensor network location problem with genetic algorithm. Comput Netw 192:108041
Karatas M (2020) A multi-objective bi-level location problem for heterogeneous sensor networks with hub-spoke topology. Comput Netw 181:107551. https://doi.org/10.1016/j.comnet.2020.107551
Karatas M, Onggo BS (2019) Optimising the barrier coverage of a wireless sensor network with hub-and-spoke topology using mathematical and simulation models. Comput Oper Res 106:36–48. https://doi.org/10.1016/j.cor.2019.02.007
Karatas M (2018) Optimal deployment of heterogeneous sensor networks for a hybrid point and barrier coverage application. Comput Netw 132:129–144. https://doi.org/10.1016/j.comnet.2018.01.001
Karatas M, Onggo BS (2016) Validating an integer non-linear program optimization model of a wireless sensor network using agent-based simulation. In: 2016 winter simulation conference (WSC), pp 1340–1351. https://doi.org/10.1109/WSC.2016.7822188
Alzubi OA (2022) A deep learning- based frechet and dirichlet model for intrusion detection in iwsn. J Intell Fuzzy Syst 42(2):873–883. https://doi.org/10.3233/JIFS-189756
Chen TM, Blasco J, Alzubi JA, Alzubi OA (2014) Intrusion detection. IET 1(1):1–9. https://doi.org/10.1049/etr.2014.0007
Gao H, Cheng S, Zhang W (2021) Gdroid: android malware detection and classification with graph convolutional network. Comput Secur 106:102264. https://doi.org/10.1016/j.cose.2021.102264
Alzubi OA, Qiqieh I, Alzubi JA (2022) Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Clust Comput In Press
Dewanje A, Kumar KA (2021) A new malware detection model using emerging machine learning algorithms. Int J Electron Inf Eng 13(1):24–32
Kouliaridis V, Kambourakis G (2021) A comprehensive survey on machine learning techniques for android malware detection. Information 12(5). https://doi.org/10.3390/info12050185
Singh J, Singh J (2021) A survey on machine learning-based malware detection in executable files. J Syst Archit 112:101861. https://doi.org/10.1016/j.sysarc.2020.101861
Zhao Y, Li L, Wang H, Cai H, Bissyandé TF, Klein J, Grundy J (2021) On the impact of sample duplication in machine-learning-based android malware detection 30(3). https://doi.org/10.1145/3446905
Choudhary S, Sharma A (2020) Malware detection & classification using machine learning. In: 2020 international conference on emerging trends in communication control and computing (ICONC3), pp 1–4. https://doi.org/10.1109/ICONC345789.2020.9117547
Eboya O, Juremi JB, Shahpasand M (2020) An intelligent framework for malware detection in internet of things (iot) ecosystem. In: 2020 IEEE 8th R10 humanitarian technology conference (R10-HTC), pp 1–6. https://doi.org/10.1109/R10-HTC49770.2020.9356961
Awan MJ, Masood OA, Mohammed MA, Yasin A, Zain AM, Damaševičius R, Abdulkareem KH (2021) Image-based malware classification using vgg19 network and spatial convolutional attention. Electronics 10(19). https://doi.org/10.3390/electronics10192444
Fournier A, El Khoury F, Pierre S (2021) A client/server malware detection model based on machine learning for android devices. IoT 2(3):355–374. https://doi.org/10.3390/iot2030019
Chen Z (2022) Research on internet security situation awareness prediction technology based on improved rbf neural network algorithm. J Comput Cogn Eng
Wani A, Khaliq R (2021) Sdn-based intrusion detection system for iot using deep learning classifier (idsiot-sdl). CAAI Trans Intell Technol 6(3):281–290
Fournier A, El Khoury F, Pierre S (2021) A client/server malware detection model based on machine learning for android devices. IoT 2(3):355–374. https://doi.org/10.3390/iot2030019
Vu LN, Jung S (2021) Admat: a cnn-on-matrix approach to android malware detection and classification. IEEE Access 9:39680–39694. https://doi.org/10.1109/ACCESS.2021.3063748
Damaševičius R, Venčkauskas A, Toldinas J, Grigaliūnas Š (2021) Ensemble-based classification using neural networks and machine learning models for windows pe malware detection. Electronics 10 (4):485
Aslan O, Yilmaz AA (2021) A new malware classification framework based on deep learning algorithms. IEEE Access 9:87936–87951. https://doi.org/10.1109/ACCESS.2021.3089586
Syrris V, Geneiatakis D (2021) On machine learning effectiveness for malware detection in android os using static analysis data. J Inf Secur Appl 59:102794. https://doi.org/10.1016/j.jisa.2021.102794
Marín G, Caasas P, Capdehourat G (2021) Deepmal - deep learning models for malware traffic detection and classification. In: Haber P, Lampoltshammer T, Mayr M, Plankensteiner K (eds) Data science – analytics and applications. Springer, pp 105–112
Khalaf B, Mostafa S, Mustapha A, Mohammed M, Mahmoud M, Al-Rimy B, Abd Razak S, Elhoseny M, Marks A (2021) An adaptive protection of flooding attacks model for complex network environments. Secur Commun Netw 2021:1–17. https://doi.org/10.1155/2021/5542919
Manickam S, Bdair A, Abdullah R, Alyasseri Z, Abdulkareem K, Mohammed M, Alani A (2022) Labelled dataset on distributed denial-of-service (ddos) attacks based on internet control message protocol version 6 (icmpv6). Wirel Commun Mob Comput 2022. https://doi.org/10.1155/2022/8060333
Lakhan A, Mohammed M, Rashid A, Kadry S, Abdulkareem K (2022) Deadline aware and energy-efficient scheduling algorithm for fine-grained tasks in mobile edge computing. Int J Web Grid Serv 18:168. https://doi.org/10.1504/IJWGS.2022.121935
Vu LN, Jung S (2021) Admat: a cnn-on-matrix approach to android malware detection and classification. IEEE Access 9:39680–39694. https://doi.org/10.1109/ACCESS.2021.3063748
Zervoudakis K, Tsafarakis S (2020) A mayfly optimization algorithm. Comput Ind Eng 145:106559. https://doi.org/10.1016/j.cie.2020.106559
Singh P, Huang Y-P (2019) A new hybrid time series forecasting model based on the neutrosophic set and quantum optimization algorithm. Comput Ind 111:121–139. https://doi.org/10.1016/j.compind.2019.06.004
Chandra R, Goyal S, Gupta R (2021) Evaluation of deep learning models for multi-step ahead time series prediction. IEEE Access 9:83105–83123. https://doi.org/10.1109/ACCESS.2021.3085085
Arora S, Singh S (2019) Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput 23. https://doi.org/10.1007/s00500-018-3102-4
APKPure (2022) DataSet_v1.0_APKPure.com.apk. https://m.apkpure.com/dataset/com.srinivasanand.dataset/download. Accessed 30 June 2022
Wei F, Li Y, Roy S, Ou X, Zhou W (2017) Deep ground truth analysis of current android malware. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 252–276
Şahin D, Kural O, Akleylek S, Kilic E (2021) A novel permission-based android malware detection system using feature selection based on linear regression. Neural Comput Appl:1–16. https://doi.org/10.1007/s00521-021-05875-1
Funding
The authors did not receive support from any organization for this work.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Consent for Publication
For this study consent for publication is not required.
Informed Consent
For this study informed consent is not required.
Competing interests
There is no conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alzubi, O.A., Alzubi, J.A., Alzubi, T.M. et al. Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model. Mobile Netw Appl 28, 795–807 (2023). https://doi.org/10.1007/s11036-023-02105-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-023-02105-x