A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization

24Citations
Citations of this article
70Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Android is the most widely used mobile platform, making it a prime target for malicious attacks. Therefore, it is imperative to effectively circumvent these attacks. Recently, machine learning has been a promising solution for malware detection, which relies on distinguishing features. While machine learning-based malware scanners have a large number of features, adversaries can avoid detection by using feature-related expertise. Therefore, one of the main tasks of the Android security industry is to consistently propose cutting-edge features that can detect suspicious activity. This study presents a novel feature representation approach for malware detection that combines API-Call Graphs (ACGs) with byte-level image representation. First, the reverse engineering procedure is used to obtain the Java programming codes and Dalvik Executable (DEX) file from Android Package Kit (APK). Second, to depict Android apps with high-level features, we develop ACGs by mining API-Calls and API sequences from Control Flow Graph (CFG). The ACGs can act as a digital fingerprint of the actions taken by Android apps. Next, the multi-head attention-based transfer learning method is used to extract trained features vector from ACGs. Third, the DEX file is converted to a malware image, and the texture features are extracted and highlighted using a combination of FAST (Features from Accelerated Segment Test) and BRIEF (Binary Robust Independent Elementary Features). Finally, the ACGs and texture features are combined for effective malware detection and classification. The proposed method uses a customized dataset prepared from the CIC-InvesAndMal2019 dataset and outperforms state-of-the-art methods with 99.27% accuracy.

References Powered by Scopus

Bags of binary words for fast place recognition in image sequences

1593Citations
N/AReaders
Get full text

A survey on automated dynamic malware-analysis techniques and tools

648Citations
N/AReaders
Get full text

A survey of mobile malware in the wild

591Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures

47Citations
N/AReaders
Get full text

Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network

12Citations
N/AReaders
Get full text

Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review

12Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Ullah, F., Srivastava, G., & Ullah, S. (2022). A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization. Journal of Cloud Computing, 11(1). https://doi.org/10.1186/s13677-022-00349-8

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 10

63%

Professor / Associate Prof. 3

19%

Lecturer / Post doc 2

13%

Researcher 1

6%

Readers' Discipline

Tooltip

Computer Science 18

82%

Engineering 2

9%

Social Sciences 1

5%

Mathematics 1

5%

Article Metrics

Tooltip
Mentions
News Mentions: 1
Social Media
Shares, Likes & Comments: 21

Save time finding and organizing research with Mendeley

Sign up for free