4.6 Article

Effective classification of android malware families through dynamic features and neural networks

Journal

CONNECTION SCIENCE
Volume 33, Issue 3, Pages 786-801

Publisher

TAYLOR & FRANCIS LTD
DOI: 10.1080/09540091.2021.1889977

Keywords

Malware analysis; malware dataset; machine learning; convolutional neural network; recurrent neural network

Ask authors/readers for more resources

This paper proposes a new dataset called Unisa Malware Dataset (UMD) for static and dynamic feature extraction characterizing malware activities. Through experiments with common machine learning tools, it demonstrates how to build efficient ML-based malware classification frameworks using the proposed dataset.
Due to their open nature and popularity, Android-based devices have attracted several end-users around the World and are one of the main targets for attackers. Because of the reasons given above, it is necessary to build tools that can reliably detect zero-day malware on these devices. At the moment, many of the frameworks that have been proposed to detect malware applications leverage Machine Learning (ML) techniques. However, an essential requirement to build these frameworks consists of using very large and sophisticated datasets for model construction and training purposes. Their success, indeed, strongly depends on the choice of the right features used for building a classification model providing adequate generalisation capability. Furthermore, the creation of a training dataset that well represents the malware properties and behaviour is one of the most critical challenges in malware analysis. Therefore, the main aim of this paper is proposing a new dataset called Unisa Malware Dataset (UMD) available on , which is based on the extraction of static and dynamic features characterising the malware activities. Additionally, we will show some experiments concerning common ML tools to demonstrate how it is possible to build efficient ML-based malware classification frameworks using the proposed dataset.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Enhancing COVID-19 tracking apps with human activity recognition using a deep convolutional neural network and HAR-images

Gianni D'Angelo, Francesco Palmieri

Summary: With the emergence of COVID-19, mobile health applications have become increasingly crucial. This study aims to enhance the performance of COVID-19 tracking apps by providing a human activity classifier based on Convolutional Deep Neural Network. Experimental results showed that the HAR-Images are effective features for human activity recognition.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

Maximum Network Lifetime Problem with Time Slots and coverage constraints: heuristic approaches

Raffaele Cerulli, Ciriaco D'Ambrosio, Antonio Iossa, Francesco Palmieri

Summary: This paper introduces the Maximum Network Lifetime Problem (MLP) and its variant Maximum Lifetime Problem with Time Slots (MLPTS) in wireless sensor networks. Three different approaches are proposed and compared through extensive computational experiments, showing that the Carousel Greedy algorithm represents the best trade-off between the proposed methods and can significantly improve network lifetime.

JOURNAL OF SUPERCOMPUTING (2022)

Article Computer Science, Information Systems

A federated approach to Android malware classification through Perm-Maps

Gianni D'Angelo, Francesco Palmieri, Antonio Robustelli

Summary: The paper proposes a new feature model called permission maps (Perm-Maps), which effectively classifies different malware families by combining information about Android permissions and their corresponding severity levels. The use of Perm-Maps, along with a training process based on federated logic, improves classification accuracy compared to other classifiers and allows for dealing with unbalanced training datasets.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2022)

Article Computer Science, Artificial Intelligence

Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey

Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Han Liu, Arcangelo Castiglione, Kuan-Ching Li

Summary: Federated learning is a decentralized deep learning technology that collaboratively updates models without sharing data, but it faces challenges such as privacy, communication costs, system heterogeneity, and unreliable model uploads in practice. Integrating blockchain technology into federated learning to create the Blockchain-based federated learning framework can improve security, performance, and application scope.

SOFT COMPUTING (2022)

Article Computer Science, Theory & Methods

Identifying patterns in multiple biomarkers to diagnose diabetic foot using an explainable genetic programming-based approach

Gianni D'Angelo, David Della-Morte, Donatella Pastore, Giulia Donadel, Alessandro De Stefano, Francesco Palmieri

Summary: Diabetes mellitus is a global health problem, and its most debilitating complication, diabetic foot, increases the risk of hospitalization, morbidity, and mortality. This study presents a Genetic Programming-based approach called X-GPC, which provides a global interpretation of the diabetic foot ulcer diagnosis through a mathematical model. It also offers a consultable 3D graph for medical staff to understand patients' situations and make decisions for their healing. Experimental results show that the proposal achieves 100% accuracy in diagnosing diabetic foot, outperforming other state-of-the-art techniques.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Information Systems

Transmission of Digital Data in the 5G Era: Compression and Privacy

Bruno Carpentieri, Francesco Palmieri

Summary: The majority of compressed digital data on modern high-speed networks is directly linked to human activities, raising concerns about privacy protection and safeguarding digital multimedia contents. This paper explores a unified approach to compression and privacy by considering various types of digital data (text, images, sound, and hyperspectral images).

INFORMATION (2023)

Article Computer Science, Theory & Methods

Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains

Gianni D'Angelo, Eslam Farsimadan, Massimo Ficco, Francesco Palmieri, Antonio Robustelli

Summary: The emergence of new and sophisticated malware targeting Android-based IoT devices poses security risks and the need for effective detection models and strategies. Federated Learning-based solutions, which use Machine Learning models without sharing user data, are being developed. However, these methods are affected by non-independent and identically distributed data. Privacy-preserving approaches using Markov chains and associative rules are proposed to handle malware classification in the IoT scenario. The approach achieves high accuracy and comparable runtime performance with centralized methods.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Theory & Methods

Survivability Analysis of IoT Systems Under Resource Exhausting Attacks

Roberto Pietrantuono, Massimo Ficco, Francesco Palmieri

Summary: This paper proposes a hybrid method to assess the survivability of an IoT system under resource-exhaustion attacks and optimize the preventive maintenance trigger period. The method combines measurements and model-based analysis to estimate resource consumption and simulate system behavior during attacks.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

MLPKV: A Local Differential Multi-Layer Private Key-Value Data Collection Scheme for Edge Computing Environments

Xiaolong Xu, Zexuan Fan, Marcello Trovati, Francesco Palmieri

Summary: This study proposes a local differential privacy (LDP) solution for multi-layer networks in edge computing scenarios, aiming to overcome limitations in key-value data heavy hitter identification and related frequency and mean estimation tasks. The proposed method optimizes the utility/performance of edge nodes and reduces communication and storage costs, while introducing an improved user grouping strategy. Experimental results show that the proposed method achieves better performance in heavy hitter identification, frequency, and mean estimations compared to other mechanisms.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Proceedings Paper Computer Science, Information Systems

A Galerkin Approach for Fractional Delay Differential Equations Using Hybrid Chelyshkov Basis Functions

Dajana Conte, Eslam Farsimadan, Leila Moradi, Francesco Palmieri, Beatrice Paternoster

Summary: This study proposes a numerical technique based on a hybrid of block-pulse functions and Chelyshkov polynomials to solve fractional delay differential equations. The suggested method's accuracy and efficiency are demonstrated using numerical examples.

COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2022, PT I (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

Efficient and Secure Transmission of Digital Data in the 5G Era

Bruno Carpentieri, Francesco Palmieri

Summary: This paper explores a unified approach to compression and privacy in response to the significant increase in network traffic and the growing need for privacy protection. It presents a secure protocol for interactive data compression and a new algorithm for scrambling the Region of Interest (ROI) of an image.

EXTENDED REALITY, XR SALENTO 2022, PT I (2022)

Proceedings Paper Computer Science, Information Systems

Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders

Gianni D'Angelo, Francesco Palmieri, Antonio Robustelli

Summary: The outbreak of the COVID-19 pandemic has led to a significant increase in the use of mobile devices by employees worldwide to access corporate systems, making them more vulnerable to malicious applications. In this paper, a novel approach called API-Streams is proposed to minimize damages at runtime. Through the use of CNN-LSTM Autoencoders, the proposed approach achieves an average accuracy of 98% in video classification tasks.

MOBILE INTERNET SECURITY, MOBISEC 2021 (2022)

Article Computer Science, Theory & Methods

Gotta CAPTCHA 'Em All: A Survey of 20 Years of the Human-or-computer Dilemma

Meriem Guerar, Luca Verderame, Mauro Migliardi, Francesco Palmieri, Alessio Merlo

Summary: A recent study has shown that malicious bots generated a significant portion of website traffic in 2019, posing a serious threat to businesses. In order to combat these bots, introducing CAPTCHA tests has become a common defense mechanism. Therefore, understanding the effectiveness of different CAPTCHA schemes is crucial. This paper provides an overview of the current research in the field of CAPTCHA schemes and introduces a new classification. It also summarizes various attack methods and discusses the limitations of different CAPTCHA schemes.

ACM COMPUTING SURVEYS (2022)

No Data Available