Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach
| dc.contributor.author | Hakim, Safayat Bin | |
| dc.contributor.author | Adil, Muhammad | |
| dc.contributor.author | Acharya, Kamal | |
| dc.contributor.author | Song, Houbing | |
| dc.date.accessioned | 2024-11-14T15:18:45Z | |
| dc.date.available | 2024-11-14T15:18:45Z | |
| dc.date.issued | 2024-09-28 | |
| dc.description.abstract | The escalating sophistication of Android malware poses significant challenges to traditional detection methods, necessitating innovative approaches that can efficiently identify and classify threats with high precision. This paper introduces a novel framework that synergistically integrates an attention-enhanced Multi-Layer Perceptron (MLP) with a Support Vector Machine (SVM) to make Android malware detection and classification more effective. By carefully analyzing a mere 47 features out of over 9,760 available in the comprehensive CCCS-CIC-AndMal-2020 dataset, our MLP-SVM model achieves an impressive accuracy over 99% in identifying malicious applications. The MLP, enhanced with an attention mechanism, focuses on the most discriminative features and further reduces the 47 features to only 14 components using Linear Discriminant Analysis (LDA). Despite this significant reduction in dimensionality, the SVM component, equipped with an RBF kernel, excels in mapping these components to a high-dimensional space, facilitating precise classification of malware into their respective families. Rigorous evaluations, encompassing accuracy, precision, recall, and F1-score metrics, confirm the superiority of our approach compared to existing state-of-the-art techniques. The proposed framework not only significantly reduces the computational complexity by leveraging a compact feature set but also exhibits resilience against the evolving Android malware landscape. | |
| dc.description.uri | http://arxiv.org/abs/2409.19234 | |
| dc.format.extent | 17 pages | |
| dc.genre | journal articles | |
| dc.genre | preprints | |
| dc.identifier | doi:10.13016/m2cppr-o7k1 | |
| dc.identifier.uri | https://doi.org/10.48550/arXiv.2409.19234 | |
| dc.identifier.uri | http://hdl.handle.net/11603/36959 | |
| dc.language.iso | en_US | |
| dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
| dc.relation.ispartof | UMBC Student Collection | |
| dc.relation.ispartof | UMBC Information Systems Department | |
| dc.relation.ispartof | UMBC Faculty Collection | |
| dc.rights | Attribution-NonCommercial-ShareAlike 4.0 International CC BY-NC-SA 4.0 Deed | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-sa/4.0/ | |
| dc.subject | Computer Science - Cryptography and Security | |
| dc.subject | Computer Science - Machine Learning | |
| dc.subject | UMBC Security and Optimization for Networked Globe Laboratory (SONG Lab) | |
| dc.title | Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach | |
| dc.type | Text | |
| dcterms.creator | https://orcid.org/0000-0002-9712-0265 | |
| dcterms.creator | https://orcid.org/0000-0003-2631-9223 |
Files
Original bundle
1 - 1 of 1
