• Login
    View Item 
    •   Home
    • Computer Science
    • Faculty Research and Publications
    • Articles
    • View Item
    •   Home
    • Computer Science
    • Faculty Research and Publications
    • Articles
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of Effat University RepositoryCommunitiesPublication DateAuthorsTitlesSubjectsPublisherJournalTypeDepartmentThis CollectionPublication DateAuthorsTitlesSubjectsPublisherJournalTypeDepartmentProfilesView

    My Account

    Login

    Statistics

    Display statistics

    Using capsule networks for android malware detection through orientation-based features

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Author
    Khan, Sohail
    Nauman, Mohammad
    Alsaif, S Ali
    Syed, T Ali
    Eleraky, H Ahmad
    Date
    2022-01-01
    
    Metadata
    Show full item record
    Abstract
    Mobile phones are an essential part of modern life. The two popular mobile phone platforms, Android and iPhone Operating System (iOS), have an immense impact on the lives of millions of people. Among these two, Android currently boasts more than 84% market share. Thus, any personal data put on it are at great risk if not properly protected. On the other hand, more than a million pieces of malware have been reported on Android in just 2021 till date. Detecting and mitigating all this malware is extremely difficult for any set of human experts. Due to this reason, machine learning–and specifically deep learning–has been utilized in the recent past to resolve this issue. However, deep learning models have primarily been designed for image analysis. While this line of research has shown promising results, it has been difficult to really understand what the features extracted by deep learning models are in the domain of malware. Moreover, due to the translation invariance property of popular models based on Convolutional Neural Network (CNN), the true potential of deep learning for malware analysis is yet to be realized. To resolve this issue, we envision the use of Capsule Networks (CapsNets), a state-of-the-art model in deep learning. We argue that since CapsNets are orientation-based in terms of images, they can potentially be used to capture spatial relationships between different features at different locations within a sequence of opcodes. We design a deep learning-based architecture that efficiently and effectively handles very large scale malware datasets to detect Android malware without resorting to very deep networks. This leads to much faster detection as well as increased accuracy. We achieve state-of-the-art F1 score of 0.987 with an FPR of just 0.002 for three very large, real-world malware datasets. Our code is made available as open source and can be used to further enhance our work with minimal effort.
    Department
    Computer Science
    Publisher
    Tech Science Press
    Journal title
    Comput. Mater. Continua
    Collections
    Articles

    entitlement

     
    DSpace software (copyright © 2002 - 2023)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.