A Probabilistic Descent Ensemble for Malware Prediction Using Deep Learning
DOI:
https://doi.org/10.4108/eetiot.6774Keywords:
Gaussian Naive Bayes, Stochastic Gradient Descent, Maximum Likelihood Estimation, Hyperparameters, Mini-Batch Gradient DescentAbstract
INTRODUCTION: Introducing a Probabilistic Descent Ensemble (PDE) approach for enhancing malware prediction through deep learning leverages the power of multiple neural network models with distinct architectures and training strategies to achieve superior accuracy while minimizing false positives. OBJECTIVES: Combining Stochastic Gradient Descent (SGD) with early stopping is a potent approach to optimising deep learning model training. Early stopping, a vital component, monitors a validation metric and halts training if it stops improving or degrades, guarding against overfitting.
METHODS: This synergy between SGD and early stopping creates a dynamic framework for achieving optimal model performance adaptable to diverse tasks and datasets, with potential benefits including reduced training time and enhanced generalization capabilities.
RESULTS: The proposed work involves training a Gaussian NB classifier with SGD as the optimization algorithm. Gaussian NB is a probabilistic classifier that assumes the features follow a Gaussian (normal) distribution. SGD is an optimization algorithm that iteratively updates model parameters to minimize a loss function.
CONCLUSION: The proposed work gives an accuracy of 99% in malware prediction and is free from overfitting and local minima.
Downloads
References
[1] Gavriluţ D, Cimpoeşu M, Anton D, Ciortuz L. Malware detection using machine learning. 2009 International multiconference on computer science and information technology. 2009;735-741.
[2] Xu Z, Ray S, Subramanyan P, Malik S. Malware detection using machine learning based analysis of virtual memory access patterns. Des Autom Test Eur Conf Exhib. 2017;169-174.
[3] Naway A, Li Y. A review on the use of deep learning in android malware detection. arXiv preprint arXiv:1812.10360. 2018.
[4] Gorment NZ, Selamat A, Cheng LK, Krejcar O. Machine learning algorithm for malware detection: Taxonomy, current challenges and future directions. IEEE Access. 2023.
[5] Rathore H, Agarwal S, Sahay SK, Sewak M. Malware detection using machine learning and deep learning. In: Big Data Analytics: 6th International Conference, BDA 2018, Warangal, India, December 18–21, 2018, Proceedings 6. Springer Int Publ. 2018;402-411.
[6] Gavriluţ D, Cimpoeşu M, Anton D, Ciortuz L. Malware detection using machine learning. 2009 International multiconference on computer science and information technology. 2009;735-741.
[7] Liu L, Wang BS, Yu B, Zhong QX. Automatic malware classification and new malware detection using machine learning. Front Inf Technol Electron Eng. 2017;18(9):1336-1347.
[8] Mahindru A, Sangal AL. MLDroid—a framework for Android malware detection using machine learning techniques. Neural Comput Appl. 2021;33(10):5183-5240.
[9] Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Venkatraman S. Robust intelligent malware detection using deep learning. IEEE Access. 2019;7:46717-46738.
[10] Karbab EB, Debbabi M, Derhab A, Mouheb D. MalDozer: Automatic framework for android malware detection using deep learning. Digit Investig. 2018;24
[11] Urooj U, Al-rimy BAS, Zainal A, Ghaleb FA, Rassam MA. Ransomware detection using the dynamic analysis and machine learning: A survey and research directions. Appl Sci. 2021;12(1):172.
[12] Firdausi I, Erwin A, Nugroho AS. Analysis of machine learning techniques used in behavior-based malware detection. 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies. 2010;201-203.
[13] Kumar MS, Purusothaman T, Kumar RL. Secure and reliable intrusion detection scheme for software-defined networking using LFTS-Rnn and PC-JTFOA. IETE J Res. 2024;1-16.
[14] Punitha P, Kumar L, Revathi S, Premalatha R, Aiswarya RS. Secured framework with a hash function-enabled keyword search in cloud storage services. Int J Coop Inf Syst. 2024;2450001.
[15] Lakshmana Kumar R, Jayanthi S, Muthu B, Sivaparthipan CB. An automatic anomaly application detection system in mobile devices using FL-HTR-DBN and SKLD-SED K means algorithms. J Intell Fuzzy Syst. 2023;(Preprint):1-14.
[16] Muthu B, Cb S, Kumar PM, Kadry SN, Hsu CH, Sanjuan O, Crespo RG. A framework for extractive text summarization based on deep learning modified neural network classifier. ACM Trans Asian Low-Resour Lang Inf Process. 2021;20(3):1-20.
[17] Dataset Collection: https://www.kaggle.com/code/vinesmsuic/malware-detection-using-deeplearning/input.
[18] Dataset Collection: https://www.kaggle.com/code/maidaly/malware-detection-with-machine-learning/input.
[19] Mahindru A, Sangal AL. SOMDROID: Android malware detection by artificial neural network trained using unsupervised learning. Evol Intell. 2022;15(1):407-437.
[20] Shaukat K, Luo S, Varadharajan V. A novel deep learning-based approach for malware detection. Eng Appl Artif Intell. 2023; 122:106030.
[21] Venkatraman S, Alazab M, Vinayakumar R. A hybrid deep learning image-based analysis for effective malware detection. J Inf Secur Appl. 2019; 47:377-389.
[22] Raymond VJ, Raj RJR, Retna J. Investigation of android malware with machine learning classifiers using enhanced PCA algorithm. Comput Syst Sci Eng. 2023;44(3):2147-2163.
[23] Udayakumar N, Saglani VJ, Cupta AV, Subbulakshmi T. Malware classification using machine learning algorithms. 2018 2nd International Conference on Trends in Electronics and Informatics. 2018;1-9.
[24] D’Angelo G, Ficco M, Palmieri F. Malware detection in mobile environments based on autoencoders and API-images. J Parallel Distrib Comput. 2020; 137:26-33.
[25] Shhadat I, Hayajneh A, Al-Sharif ZA. The use of machine learning techniques to advance the detection and classification of unknown malware. Procedia Comput Sci. 2020; 170:917-922.
[26] Gupta SK, Pattnaik B, Agrawal V, Boddu RSK, Srivastava A, Hazela B. Malware detection using genetic cascaded support vector machine classifier in internet of things. 2022 Second International Conference on Computer Science, Engineering and Applications. 2022;1-6.
[27] Shaukat K, Luo S, Chen S, Liu D. Cyber threat detection using machine learning techniques: A performance evaluation perspective. 2020 International Conference on Cyber Warfare and Security. 2020;1-6.
[28] Aljabri M, Mirza S. Phishing attacks detection using machine learning and deep learning models. 2022 7th International Conference on Data Science and Machine Learning Applications. 2022;175-180.
[29] Selvaganapathy S, Nivaashini M, Natarajan H. Deep belief network-based detection and categorization of malicious URLs. Inf Secur J Glob Perspect. 2018;27(3):145-161.
[30] Alwaghid AF, Sarkar NI. Exploring malware behavior of webpages using machine learning technique: An empirical study. Electronics. 2020;9(6):1033.
[31] Masum M, Nur I, Faruk MH, Adnan M, Shahriar H. A comparative study of machine learning-based autism spectrum disorder detection with feature importance analysis. In: COMPSAC 2022: Computer Software and Applications Conference. 2022;3.
[32] Syafaâ L, Zulfatman Z, Pakaya I, Lestandy M. Comparison of machine learning classification methods in hepatitis C virus. Jurnal Online Inform. 2021;6(1):73-78.
[33] Htwe CS, Thant YM, Thwin MMS. Botnets attack detection using machine learning approach for IoT environment. J Phys Conf Ser. 2020;1646(1):012101.
[34] Rbah Y, Mahfoudi M, Balboul Y, Fattah M, Mazer S, Elbekkali M, Bernoussi B. Machine learning and deep learning methods for intrusion detection systems in IoMT: A survey. 2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology. 2022;1-9.
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.