SeqDroid: Obfuscated android malware detection using stacked convolutional and recurrent neural networks

50Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To evade detection, attackers usually obfuscate malicious Android applications. These malicious applications often have randomly generated application IDs or package names, and they are also often signed with randomly created certificates. Conventional machine learning models for detecting such malware are neither robust enough nor scalable to the volume of Android applications that are being produced on a daily basis. Recurrent neural networks (RNN) and convolutional neural networks (CNN) have been applied to identify malware by learning patterns in sequence data. We propose a novel malware classification method for malicious Android applications using stacked RNNs and CNNs so that our model learns the generalized correlation between obfuscated string patterns from an application’s package name and the certificate owner name. The model extracts machine learning features using embedding and gated recurrent units (GRU), and an additional CNN unit further optimizes the feature extraction process. Our experiments demonstrate that our approach outperforms Ngram-based models and that our feature extraction method is robust to obfuscation and sufficiently lightweight for Android devices.

Cite

CITATION STYLE

APA

Lee, W. Y., Saxe, J., & Harang, R. (2019). SeqDroid: Obfuscated android malware detection using stacked convolutional and recurrent neural networks. In Advanced Sciences and Technologies for Security Applications (pp. 197–210). Springer. https://doi.org/10.1007/978-3-030-13057-2_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free