A Dynamic DL-driven architecture to Combat Sophisticated Android Malware

Iram Bibi, Adnan Akhunzada, Jahanzaib Malik, Javed Iqbal, Arslan Musaddiq, Sung Won Kim

Research output: Contribution to journalJournal articleResearchpeer-review

306 Downloads (Pure)

Abstract

The predominant Android operating system has captured enormous attention globally not only in smart phone industry but also for varied smart devices. The open architecture and application programming interfaces (APIs) while hosting third party applications has led to explosive growth of varied pervasive sophisticated Android malware production. In this study, we propose a robust, scalable and efficient Cuda-empowered multi-class malware detection technique leveraging Gated Recurrent Unit (GRU) to identify sophisticated Android malware. Experimentation of the proposed technique has been carried out using current state-of-the-art datasets of Android applications (i.e., Android Malware Dataset (AMD), Androzoo). Moreover, to rigorously evaluate the performance of the proposed technique, we have employed standard performance evaluation metrics (e.g., accuracy, precision, recall, F1-score etc.) and compared it with our constructed DL-driven architectures and benchmark algorithms. The GRU-based malware detection system outperforms with 98.99% detection accuracy for malware identification with a trivial trade off in speed efficiency.
Original languageEnglish
JournalIEEE Access
Volume8
Pages (from-to)129600 - 129612
ISSN2169-3536
DOIs
Publication statusPublished - 2020

Keywords

  • Android malware
  • Deep learning
  • Recurrent neural network
  • Convolutional neural network
  • Deep neural networks
  • Mobile security

Fingerprint

Dive into the research topics of 'A Dynamic DL-driven architecture to Combat Sophisticated Android Malware'. Together they form a unique fingerprint.

Cite this