Skip to main content
Log in

Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Malware refers to malicious software developed to penetrate or damage a computer system without any owner’s informed consent. It uses target system susceptibilities, like bugs in legitimate software that can be harmed. For dealing with the new malware, new approaches have been developed to identify and prevent any damage caused. The recent advances in Deep Learning (DL) models are useful for malware detection because they are trained via feature learning instead of task-specific approaches. This paper presents an Optimal Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification (OELSTM-MDC) technique. The presented OELSTM-MDC technique involves the identification and classification of malware. To accomplish this, the OELSTM-MDC model applies pre-processing in the initial stage for data normalization. In addition, Quantum Mayfly Optimization-based Feature Selection (QMFO-FS) approach is derived from choosing an optimal subset of features. Finally, the Butterfly Optimization Algorithm (BOA) is employed for optimal hyperparameter tuning of the ELSTM model. A wide range of empirical analysis is investigated on benchmark datasets to assess the better malware classification performance of the OELSTM-MDC model. It is also compared with the conventional machine learning models such as Random Forest, XGBoost, support vector machine, etc. According to the comparison studies, the OELSTM-MDC model outperformed conventional techniques by detecting the malware class and benign class with accuracy of 97.14% and 98.33% based on the training and testing datasets.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data Availability

Not applicable.

References

  1. Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115. https://doi.org/10.1016/j.jnca.2016.11.027

    Article  Google Scholar 

  2. Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol

  3. Gibert D, Mateu C, Planes J (2020) The rise of machine learning for detection and classification of malware: research developments, trends and challenges. J Netw Comput Appl 153(C). https://doi.org/10.1016/j.jnca.2019.102526

  4. Chakraborty A, Alam M, Dey V, Chattopadhyay A, Mukhopadhyay D (2021) A survey on adversarial attacks and defences. CAAI Transactions on Intelligence Technology 6(1):25–45

    Article  Google Scholar 

  5. Shhadat I, Bataineh B, Hayajneh A, Al-Sharif ZA (2020) The use of machine learning techniques to advance the detection and classification of unknown malware. Procedia Comput Sci 170:917–922. https://doi.org/10.1016/j.procs.2020.03.110

    Article  Google Scholar 

  6. Chen T, Mao Q, Yang Y, Lv M, Zhu J (2018) Tinydroid: a lightweight and efficient model for android malware detection and classification. Mob Inf Syst 2018:1–9. https://doi.org/10.1155/2018/4157156

    Article  Google Scholar 

  7. Alzubi OA, Alzubi JA, Al-Zoubi AM, Hassonah MA, KÖSE U (2022) An efficient malware detection approach with feature weighting based on harris hawks optimization. Clust Comput 25:2369–2387. https://doi.org/10.1007/s10586-021-03459-1

    Article  Google Scholar 

  8. Roseline SA, Geetha S, Kadry S, Nam Y (2020) Intelligent vision-based malware detection and classification using deep random forest paradigm. IEEE Access 8:206303–206324. https://doi.org/10.1109/ACCESS.2020.3036491

    Article  Google Scholar 

  9. Vu LN, Jung S (2021) Admat: a cnn-on-matrix approach to android malware detection and classification. IEEE Access 9:39680–39694. https://doi.org/10.1109/ACCESS.2021.3063748

    Article  Google Scholar 

  10. Mahmood T, Ali Z (2022) Prioritized muirhead mean aggregation operators under the complex single-valued neutrosophic settings and their application in multi-attribute decision-making. J Comput Cogn Eng:56–73

  11. Alamleh A, Albahri O, Zaidan A, Alamoodi A, Albahri A, Zaidan B, Qahtan S, Binti Ismail AR, Malik R, Baqer M et al (2022) Multi-attribute decision-making for intrusion detection systems: a systematic review. Int J Inf Technol Decis Mak:1–48

  12. Alzubi OA (2022) Quantum readout and gradient deep learning model for secure and sustainable data access in iwsn. PeerJ Comput Sci 8:983–1007. https://doi.org/10.7717/peerj-cs.983

    Article  Google Scholar 

  13. Yakici E, Karatas M (2021) Solving a multi-objective heterogeneous sensor network location problem with genetic algorithm. Comput Netw 192:108041

    Article  Google Scholar 

  14. Karatas M (2020) A multi-objective bi-level location problem for heterogeneous sensor networks with hub-spoke topology. Comput Netw 181:107551. https://doi.org/10.1016/j.comnet.2020.107551

    Article  Google Scholar 

  15. Karatas M, Onggo BS (2019) Optimising the barrier coverage of a wireless sensor network with hub-and-spoke topology using mathematical and simulation models. Comput Oper Res 106:36–48. https://doi.org/10.1016/j.cor.2019.02.007

    Article  MathSciNet  Google Scholar 

  16. Karatas M (2018) Optimal deployment of heterogeneous sensor networks for a hybrid point and barrier coverage application. Comput Netw 132:129–144. https://doi.org/10.1016/j.comnet.2018.01.001

    Article  Google Scholar 

  17. Karatas M, Onggo BS (2016) Validating an integer non-linear program optimization model of a wireless sensor network using agent-based simulation. In: 2016 winter simulation conference (WSC), pp 1340–1351. https://doi.org/10.1109/WSC.2016.7822188

  18. Alzubi OA (2022) A deep learning- based frechet and dirichlet model for intrusion detection in iwsn. J Intell Fuzzy Syst 42(2):873–883. https://doi.org/10.3233/JIFS-189756

    Article  Google Scholar 

  19. Chen TM, Blasco J, Alzubi JA, Alzubi OA (2014) Intrusion detection. IET 1(1):1–9. https://doi.org/10.1049/etr.2014.0007

    Google Scholar 

  20. Gao H, Cheng S, Zhang W (2021) Gdroid: android malware detection and classification with graph convolutional network. Comput Secur 106:102264. https://doi.org/10.1016/j.cose.2021.102264

    Article  Google Scholar 

  21. Alzubi OA, Qiqieh I, Alzubi JA (2022) Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Clust Comput In Press

  22. Dewanje A, Kumar KA (2021) A new malware detection model using emerging machine learning algorithms. Int J Electron Inf Eng 13(1):24–32

    Google Scholar 

  23. Kouliaridis V, Kambourakis G (2021) A comprehensive survey on machine learning techniques for android malware detection. Information 12(5). https://doi.org/10.3390/info12050185

  24. Singh J, Singh J (2021) A survey on machine learning-based malware detection in executable files. J Syst Archit 112:101861. https://doi.org/10.1016/j.sysarc.2020.101861

    Article  Google Scholar 

  25. Zhao Y, Li L, Wang H, Cai H, Bissyandé TF, Klein J, Grundy J (2021) On the impact of sample duplication in machine-learning-based android malware detection 30(3). https://doi.org/10.1145/3446905

  26. Choudhary S, Sharma A (2020) Malware detection & classification using machine learning. In: 2020 international conference on emerging trends in communication control and computing (ICONC3), pp 1–4. https://doi.org/10.1109/ICONC345789.2020.9117547

  27. Eboya O, Juremi JB, Shahpasand M (2020) An intelligent framework for malware detection in internet of things (iot) ecosystem. In: 2020 IEEE 8th R10 humanitarian technology conference (R10-HTC), pp 1–6. https://doi.org/10.1109/R10-HTC49770.2020.9356961

  28. Awan MJ, Masood OA, Mohammed MA, Yasin A, Zain AM, Damaševičius R, Abdulkareem KH (2021) Image-based malware classification using vgg19 network and spatial convolutional attention. Electronics 10(19). https://doi.org/10.3390/electronics10192444

  29. Fournier A, El Khoury F, Pierre S (2021) A client/server malware detection model based on machine learning for android devices. IoT 2(3):355–374. https://doi.org/10.3390/iot2030019

    Article  Google Scholar 

  30. Chen Z (2022) Research on internet security situation awareness prediction technology based on improved rbf neural network algorithm. J Comput Cogn Eng

  31. Wani A, Khaliq R (2021) Sdn-based intrusion detection system for iot using deep learning classifier (idsiot-sdl). CAAI Trans Intell Technol 6(3):281–290

    Article  Google Scholar 

  32. Fournier A, El Khoury F, Pierre S (2021) A client/server malware detection model based on machine learning for android devices. IoT 2(3):355–374. https://doi.org/10.3390/iot2030019

    Article  Google Scholar 

  33. Vu LN, Jung S (2021) Admat: a cnn-on-matrix approach to android malware detection and classification. IEEE Access 9:39680–39694. https://doi.org/10.1109/ACCESS.2021.3063748

    Article  Google Scholar 

  34. Damaševičius R, Venčkauskas A, Toldinas J, Grigaliūnas Š (2021) Ensemble-based classification using neural networks and machine learning models for windows pe malware detection. Electronics 10 (4):485

    Article  Google Scholar 

  35. Aslan O, Yilmaz AA (2021) A new malware classification framework based on deep learning algorithms. IEEE Access 9:87936–87951. https://doi.org/10.1109/ACCESS.2021.3089586

    Article  Google Scholar 

  36. Syrris V, Geneiatakis D (2021) On machine learning effectiveness for malware detection in android os using static analysis data. J Inf Secur Appl 59:102794. https://doi.org/10.1016/j.jisa.2021.102794

    Article  Google Scholar 

  37. Marín G, Caasas P, Capdehourat G (2021) Deepmal - deep learning models for malware traffic detection and classification. In: Haber P, Lampoltshammer T, Mayr M, Plankensteiner K (eds) Data science – analytics and applications. Springer, pp 105–112

  38. Khalaf B, Mostafa S, Mustapha A, Mohammed M, Mahmoud M, Al-Rimy B, Abd Razak S, Elhoseny M, Marks A (2021) An adaptive protection of flooding attacks model for complex network environments. Secur Commun Netw 2021:1–17. https://doi.org/10.1155/2021/5542919

    Article  Google Scholar 

  39. Manickam S, Bdair A, Abdullah R, Alyasseri Z, Abdulkareem K, Mohammed M, Alani A (2022) Labelled dataset on distributed denial-of-service (ddos) attacks based on internet control message protocol version 6 (icmpv6). Wirel Commun Mob Comput 2022. https://doi.org/10.1155/2022/8060333

  40. Lakhan A, Mohammed M, Rashid A, Kadry S, Abdulkareem K (2022) Deadline aware and energy-efficient scheduling algorithm for fine-grained tasks in mobile edge computing. Int J Web Grid Serv 18:168. https://doi.org/10.1504/IJWGS.2022.121935

    Article  Google Scholar 

  41. Vu LN, Jung S (2021) Admat: a cnn-on-matrix approach to android malware detection and classification. IEEE Access 9:39680–39694. https://doi.org/10.1109/ACCESS.2021.3063748

    Article  Google Scholar 

  42. Zervoudakis K, Tsafarakis S (2020) A mayfly optimization algorithm. Comput Ind Eng 145:106559. https://doi.org/10.1016/j.cie.2020.106559

    Article  Google Scholar 

  43. Singh P, Huang Y-P (2019) A new hybrid time series forecasting model based on the neutrosophic set and quantum optimization algorithm. Comput Ind 111:121–139. https://doi.org/10.1016/j.compind.2019.06.004

    Article  Google Scholar 

  44. Chandra R, Goyal S, Gupta R (2021) Evaluation of deep learning models for multi-step ahead time series prediction. IEEE Access 9:83105–83123. https://doi.org/10.1109/ACCESS.2021.3085085

    Article  Google Scholar 

  45. Arora S, Singh S (2019) Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput 23. https://doi.org/10.1007/s00500-018-3102-4

  46. APKPure (2022) DataSet_v1.0_APKPure.com.apk. https://m.apkpure.com/dataset/com.srinivasanand.dataset/download. Accessed 30 June 2022

  47. Wei F, Li Y, Roy S, Ou X, Zhou W (2017) Deep ground truth analysis of current android malware. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 252–276

  48. Şahin D, Kural O, Akleylek S, Kilic E (2021) A novel permission-based android malware detection system using feature selection based on linear regression. Neural Comput Appl:1–16. https://doi.org/10.1007/s00521-021-05875-1

Download references

Funding

The authors did not receive support from any organization for this work.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jafar A. Alzubi or Ashish Singh.

Ethics declarations

Consent for Publication

For this study consent for publication is not required.

Informed Consent

For this study informed consent is not required.

Competing interests

There is no conflict of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alzubi, O.A., Alzubi, J.A., Alzubi, T.M. et al. Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model. Mobile Netw Appl 28, 795–807 (2023). https://doi.org/10.1007/s11036-023-02105-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-023-02105-x

Keywords

Navigation