操作码
计算机科学
Android恶意软件
恶意软件
Android(操作系统)
人工智能
随机森林
机器学习
计算机安全
深度学习
预处理器
特征提取
数据挖掘
操作系统
计算机硬件
作者
Huan Huan Liu,Liangyi Gong,Xiuliang Mo,Guozhong Dong,Jie Yu
出处
期刊:IEEE Internet of Things Journal
[Institute of Electrical and Electronics Engineers]
日期:2024-04-30
卷期号:11 (14): 25371-25381
标识
DOI:10.1109/jiot.2024.3394555
摘要
Android applications have emerged as a prime target for hackers. Android malware detection stands as a pivotal technology, crucial for safeguarding network security and thwarting anomalies. However, traditional static analysis makes it difficult to analyze new malicious applications, while dynamic analysis requires higher system resources. We propose a novel lightweight Android malware deep-learning detection framework based on attention temporal networks. This study delves into the Dalvik opcode sequences of Android malware, employing the N-gram algorithm to partition sequences and extract contextual information features. Then, LSTM and TCN algorithms are employed to capture long-term dependencies and local features, enabling comprehensive comprehension of temporal information within Dalvik opcode sequences. Especially, TCN facilitates feature extraction across various time scales, thereby enabling the detection of anomaly patterns across diverse temporal scales within Dalvik opcode sequences. Moreover, we introduce multi-head attention mechanisms and reinforced learning to direct the model's focus toward behavioral cues within malicious software sequences. Finally, extensive experiment results show that our proposed methodology and model exhibit higher detection accuracy and robustness, achieving an accuracy rate of 98.69% on average, surpassing traditional machine learning methods such as random forest, and Pseudo-Label deep neural networks.
科研通智能强力驱动
Strongly Powered by AbleSci AI