Intelligent Malware Detection Using a Neural Network Ensemble Based on a Hybrid Search Mechanism
DOI:
https://doi.org/10.23962/10539/28660Keywords:
cybersecurity, malware, malware detection, artificial intelligence, neural networks, neural network ensemble, memetic algorithm, optimisation, hybrid search, tabu searchAbstract
Malware threats have become increasingly dynamic and complex, and, accordingly, artificial intelligence techniques have become the focal point for cybersecurity, as they are viewed as being more suited to tackling modern malware incidents. Specifically, neural networks, with their strong generalisation performance capability, are able to address a wide range of cyber threats. This article outlines the development and testing of a neural network ensemble approach to malware detection, based on a hybrid search mechanism. In this mechanism, the optimising of individual networks is done by an adaptive memetic algorithm with tabu search, which is also used to improve hidden neurons and weights of neural networks. The adaptive memetic algorithm combines global and local search optimisation techniques in order to overcome premature convergence and obtain an optimal search outcome. The results from the testing prove that the proposed method is strongly adaptive and efficient in its detection of a range of malware threats, and that it generates better results than other existing methods.
References
Abiodun, O., Jantan, A., Omolara, A. E., Dada, K. V., Mohamed, N. A., & Arshad, H. (2018). State-of-the-art in artificial neural network applications: A survey. Heliyon, 4(11), 1–41. https://doi.org/10.1016/j.heliyon.2018.e00938
Acarali, D., Rajarajan, M., Komninos, N., & Zarpelao, B. B. (2019). Modelling the spread of botnet malware in IoT-based wireless sensor networks. Security and Communication Networks, 2019, 1–13. https://doi.org/10.1155/2019/3745619
Alsulami, B., & Mancoridis, S. (2018). Behavioral malware classification using convolutional recurrent neural networks. In 13th International Conference on Malicious and Unwanted Software (pp. 103–111). https://doi.org/10.1109/MALWARE.2018.8659358
Altaher, A., & Barukab, O. M. (2017). Intelligent hybrid approach for Android malware detection based on permissions and API calls. International Journal of Advanced Computer Science and Applications, 8(6), 60–67. https://doi.org/10.14569/IJACSA.2017.080608
Amjad, M. K., Butt, S. I., Kousar, R., Ahmad, R., Agha, M. H., Faping, Z., Anjum, N., & Asgher, U. (2018). Recent research trends in genetic algorithm based flexible job shop scheduling problems. Mathematical Problems in Engineering, 2018, 1–32. https://doi.org/10.1155/2018/9270802
Barriga, J. J., & Yoo, S. G. (2017). Malware detection and evasion with machine learning techniques: A survey. International Journal of Applied Engineering Research, 12(18), 7207–7214.
Bereta, M. (2019). Baldwin effect and Lamarckian evolution in a memetic algorithm for Euclidean Steiner tree problem. Memetic Computing, 11(1), 35–52. https://doi.org/10.1007/s12293-018-0256-7
Center for Machine Learning and Intelligent Systems (2016). Machine learning repository [Website]. University of California, Irvine. Retrieved from https://archive.ics.uci.edu/ml/datasets.php?format=&task=other&att=&area=&numAtt=&numIns=&type=&sort=nameUp&view=table
Chaimanee, A., & Supithak, W. (2018). A memetic algorithm to minimize the total sum of earliness tardiness and sequence dependent setup costs for flow shop scheduling problems with job distinct due windows. Songklanakarin Journal of Science and Technology, 40(5), 1203–1218. doi:10.14456/sjst-psu.2018.148
Chen, H., Su, J., & Qiao, L. (2018). Malware collusion attack against SVM: Issues and countermeasures. Journal of Applied Sciences, 8(10), 1–20. https://doi.org/10.3390/app8101718
Choi, J. Y., & Lee, B. (2018). Combining LSTM network ensemble via adaptive weighting for improved time series forecasting. Mathematical Problems in Engineering, 2018, 1–8. https://doi.org/10.1155/2018/2470171
Dai, H., Cheng, W., & Guo, P. (2018). An improved tabu search for multi-skill resource- constrained project scheduling problems under step-deterioration. Arabian Journal for Science and Engineering, 43(6), 3279–3290. https://doi.org/10.1007/s13369-017-3047-4
Dash, T. (2017). A study on intrusion detection using neural networks trained with evolutionary algorithms. Soft Computing, 21(10), 2687–2700. https://doi.org/10.1007/s00500-015-1967-z
Eger, S., Youssef, P., & Gurevych, I. (2018). Is it time to swish? Comparing deep learning activation functions across NLP tasks. In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing (pp. 4415–4424). Association for Computational Linguistics. https://doi.org/10.18653/v1/D18-1472
Gu, Q., Li, X., & Jiang, S. (2019). Hybrid genetic grey wolf algorithm for large-scale global optimization. Complexity, 2019, 1–18. https://doi.org/10.1155/2019/2653512
Hassan, M., & Hamada, M. (2017). A neural networks approach for improving the accuracy of multi-criteria recommender systems. Applied Sciences, 7(9), 1–18. https://doi.org/10.3390/app7090868
Jat, D. S., Dhaka, P., & Limbo, A. (2018). Applications of statistical techniques and artificial neural networks: A review. Journal of Statistics and Management Systems, 21(4), 639– 645. https://doi.org/10.1080/09720510.2018.1475073
Jerlin, A. M., & Marimuthu, K. (2018). A new malware detection system using machine learning techniques for API call sequences. Journal of Applied Security Research, 13(1), 45–62. https://doi.org/10.1080/19361610.2018.1387734
Ju, C., Bibaut, A., & Van der Laan, M. (2018). The relative performance of ensemble methods with deep convolutional neural networks for image classification. Journal of Applied Statistics, 45(15), 2800–2818. https://doi.org/10.1080/02664763.2018.1441383
Kabanga, E. K., & Kim, C. H. (2018). Malware images classification using convolutional neural network. Journal of Computer Science and Communications, 6(1), 153–158. https://doi.org/10.4236/jcc.2018.61016
Kalaimannan, E., John, S. K., DuBose, T., & Pinto, A. (2017). Influences on ransomware’s evolution and predictions for the future challenges. Journal of Cyber Security Technology, 1(1), 23–31. https://doi.org/10.1080/23742917.2016.1252191
Kendrick, P., Criado, N., Hussain, A., & Randles, M. (2018). A self-organising multi-agent system for decentralised forensic investigations. Journal of Expert Systems with Applications, 102, 12–26. https://doi.org/10.1016/j.eswa.2018.02.023
Khammas, B. (2018). Malware detection using sub-signatures and machine learning technique. Journal of Information Security Research, 9(3), 96–106. https://doi.org/10.6025/jisr/2018/9/3/96-106
Khoshhalpour, E., & Shahriari, H. R. (2018). BotRevealer: Behavioral detection of botnets based on botnet life-cycle. The ISC International Journal of Information Security, 10(1), 55–61.
Le, H., Pham, Q., Sahoo, D., & Hoi, S. C. (2017). URLNet: Learning a URL representation with deep learning for malicious URL detection. In Proceedings of ACM Conference (pp. 1–13). Washington, DC. Retrieved from https://arxiv.org/pdf/1802.03162.pdf
Le, Q., Boydell, O., Namee, B. M., & Scanlon, M. (2018). Deep learning at the shallow end: Malware classification for non-domain experts. Digital Investigation, 26, 118–126. https://doi.org/10.1016/j.diin.2018.04.024
Lee, T., & Kwak, J. (2016). Effective and reliable malware group classification for a massive malware environment. International Journal of Distributed Sensor Networks, 2016, 1–6. https://doi.org/10.1155/2016/4601847
Li, H., Wang, X., & Ding, S. (2018). Research and development of neural network ensembles: A survey. Journal of Artificial Intelligence Review, 49(4), 455–479. https://doi.org/10.1007/s10462-016-9535-1
Liu, Z., Li, H., & Zhu, P. (2019). Diversity enhanced particle swarm optimization algorithm and its application in vehicle lightweight design. Journal of Mechanical Science and Technology, 33(2), 695–709. https://doi.org/10.1007/s12206-019-0124-5
Lucay, F. A., Galvez, E. D., & Cisternas, L. A. (2019). Design of flotation circuits using tabu- search algorithms: Multispecies, equipment design, and profitability parameters. Minerals, 9(3), 1–22. https://doi.org/10.3390/min9030181
Ma, Z., Wang, P., Gao, Z., Wang, R., & Khalighi, K. (2018). Ensemble of machine learning algorithms using the stacked generalization approach to estimate the warfarin dose. PLoS ONE, 13(10), 1–12. https://doi.org/10.1371/journal.pone.0205872
Mahrin, M. N., Chuprat, S., Subrarao, A., Ariffin, A. F., Talib, M. Z., Darus, M. Z., & Aziz, F. A. (2018). Malware prediction algorithm. Journal of Theoretical and Applied Information Technology, 96(14), 4660–4676.
Martinelli, F., Marulli, F., & Mercaldo, F. (2017). Evaluating convolutional neural network for effective mobile malware detection. Procedia Computer Science, 112, 2372–2381. https://doi.org/10.1016/j.procs.2017.08.216
Mohammadi, S., & Namadchian, A. (2017). A new deep learning approach for anomaly base IDS using memetic classifier. International Journal of Computers Communications C Control, 12(5), 677–688. https://doi.org/10.15837/ijccc.2017.5.2972
Nguyen, P. T., & Sudholt, D. (2018). Memetic algorithms beat evolutionary algorithms on the class of hurdle problems. In Proceedings of the Genetic and Evolutionary Computation Conference (pp. 1071–1078). Kyoto: ACM. https://doi.org/10.1145/3205455.3205456
Ojha, V. K., Abraham, A., & Snasel, V. (2017). Metaheuristic design of feedforward neural networks: A review of two decades of research. Engineering Applications of Artificial Intelligence, 60, 97–116. https://doi.org/10.1016/j.engappai.2017.01.013
Okobah, I. P., & Ojugo, A. A. (2018). Evolutionary memetic models for malware intrusion detection: A comparative quest for computational solution and convergence. International Journal of Computer Applications, 179(39), 34–43. https://doi.org/10.5120/ijca2018916586
Rad, B. B., Nejad, K. H., & Shahpasand, M. (2018). Malware classification and detection using artificial neural network. Journal of Engineering Science and Technology, 13, 14–23.
Razak, M. F., Anuar, N. B., Othman, F., Firdaus, A., Afifi, F., & Salleh, R. (2018). Bio- inspired for features optimization and malware detection. Arabian Journal for Science and Engineering, 43(12), 6963–6979. https://doi.org/10.1007/s13369-017-2951-y
Ren, B., Liu, C., Cheng, B., Guo, J., & Chen, J. (2018). MobiSentry: Towards easy and effective detection of android malware on smartphones. Mobile Information Systems, 2018, 1–14. https://doi.org/10.1155/2018/4317501
Rhode, M., Burnap, P., & Jones, K. (2018). Early-stage malware prediction using recurrent neural networks. Computer Security, 77, 578–594. https://doi.org/10.1016/j.cose.2018.05.010
Schweidtmann, A., & Mitsos, A. (2019). Deterministic global optimization with artificial neural networks embedded. Journal of Optimization Theory and Applications, 180(3), 925–948. https://doi.org/10.1007/s10957-018-1396-0
Selvaganapathy, S., Nivaashini, M., & Natarajan, H. (2018). Deep belief network based detection and categorization of malicious URLs. Information Security Journal: A Global Perspective, 27(3), 145–161. https://doi.org/10.1080/19393555.2018.1456577
Shaffer, L. K. (2019). Before p < 0.05 to beyond p < 0.05: Using history to contextualize p-values and significance testing. The American Statistician, 73(1), 82–90. https://doi.org/10.1080/00031305.2018.1537891
Shah, A. A., Ehsan, K. M., Ishaq, K., Ali, Z., & Farooq, M. S. (2018). An efficient hybrid classifier model for anomaly intrusion detection system. International Journal of Computer Science and Network Security, 18(11), 127–136.
Shapshak, P. (2018). Artificial intelligence and brain. Bioinformation, 14(1), 38–41. https://doi.org/10.6026/97320630014038
Sheng, W., Shan, P., Mao, J., Zheng, Y., Chen, S., & Wang, Z. (2017). An adaptive memetic algorithm with rank-based mutation for artificial neural network architecture optimization. IEEE Access, 5, 18895–18907. https://doi.org/10.1109/ACCESS.2017.2752901
Souri, A., & Hosseini, R. (2018). A state-of-the-art survey of malware detection approaches using data mining techniques. Journal of Human-centric Computing and Information Sciences, 8(3), 1–22. https://doi.org/10.1186/s13673-018-0125-x
Wang, Z., Liu, C., Qiu, J., Tian, Z., Cui, X., & Su, S. (2018). Automatically traceback RDP- based targeted ransomware attacks. Wireless Communications and Mobile Computing, 2018, 1–13. https://doi.org/10.1155/2018/7943586
World Economic Forum (WEF). (2018). The global risks report 2018. Geneva. Retrieved from
http://www3.weforum.org/docs/WEF_GRR18_Report.pdf
Xiao, F., Lin, Z., Sun, Y., & Ma, Y. (2019). Malware detection based on deep learning of behavior graphs. Mathematical Problem in Engineering, 2019, 1–10. https://doi.org/10.1155/2019/8195395
Xu, H., Pu, P., & Duan, F. (2018). Dynamic vehicle routing problems with enhanced ant colony optimization. Discrete Dynamics in Nature and Society, 2018, 1–13. https://doi.org/10.1155/2018/1295485
Xu, Y., Wu, C., Zheng, K., Wang, X., Niu, X., & Lu, T. (2017). Computing adaptive feature weights with PSO to improve Android malware detection. Security and Communication Networks, 2017, 1–14. https://doi.org/10.1155/2017/3284080
Xue, Y., Jia, W., Zhao, X., & Pang, W. (2018). An evolutionary computation based feature selection method for intrusion detection. Security and Communication Networks, 2018, 1–10. https://doi.org/10.1155/2018/2492956
Yan, J., Qi, Y., & Rao, Q. (2018). Detecting malware with an ensemble method based on deep neural network. Security and Communication Networks, 2018, 1–16. https://doi.org/10.1155/2018/7247095
Yin, W., Zhou, H., Wang, M., Jin, Z., & Xu, J. (2018). A dynamic malware detection mechanism based on deep learning. International Journal of Computer Science and Network Security, 18(7), 96–102.
Zarras, B. K., Webster, G. D., & Eckert, C. M. (2016). Deep learning for classification of malware system call sequences. In Australasian conference on artificial intelligence (pp. 137–149). Wellington, New Zealand: Springer. https://doi.org/10.1007/978-3-319-50127-7_11
Zhirou, Y., & Jing, L. (2018). A memetic algorithm for determining the nodal attacks with minimum cost on complex networks. Physica A: Statistical Mechanics and its Applications, 503, 1041–1053. https://doi.org/10.1016/j.physa.2018.08.132
Downloads
Published
Issue
Section
License
Copyright (c) 2019 https://creativecommons.org/licenses/by/4.0

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
- Abstract 267
- pdf 101