Enhancing Cyber Security Via Malware Classification using Tuna Swarm-Based Feature Selection with Optimal Deep Learning
International Journal of Electronics and Communication Engineering |
© 2024 by SSRG - IJECE Journal |
Volume 11 Issue 10 |
Year of Publication : 2024 |
Authors : V. S. Pavankumar, S. Arivalagan, M. Murugesan, P. Sudhakar |
How to Cite?
V. S. Pavankumar, S. Arivalagan, M. Murugesan, P. Sudhakar, "Enhancing Cyber Security Via Malware Classification using Tuna Swarm-Based Feature Selection with Optimal Deep Learning," SSRG International Journal of Electronics and Communication Engineering, vol. 11, no. 10, pp. 247-257, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I10P120
Abstract:
Malware detection is a central aspect of cyber security that includes detecting and mitigating malicious software, often called malware, that can compromise the safety and integrity of a computer system. Different malware detection techniques are used, such as Machine Learning (ML), signature-based detection, and behavioural analysis. Cutting-edge ML models are widely applied for malware detection. These techniques analyze large datasets to detect features and patterns related to malicious behaviours. Supervised learning trains models on labelled datasets, while unsupervised learning can identify anomalies in system behaviours without predefined labels. Deep Learning (DL)-based malware detection improves the capability to identify polymorphic and sophisticated risks and promotes a more adaptive proactive cyber security system. This study introduces Malware Recognition and Classification using the Tuna Swarm Optimization-based Feature Selection with DL (MRC-TSOFSDL) approach. In the MRC-TSOFSDL approach, the feature subset selection process is accomplished using the TSO model. The Stacked Sparse Autoencoder (SSAE) method is used to recognise malware automatically. Chimp optimization Algorithm (ChoA) based on a hyperparameter tuning process is utilized to improve the malware detection outcomes of the SSAE model. The performance analysis of the MRC-TSOFSDL method is examined under a malware dataset. The comparative results of the MRC-TSOFSDL technique demonstrated a maximum accuracy value of 98.65% over existing models.
Keywords:
Malware detection, Cybersecurity, Deep Learning, Tuna Swarm Optimization, Feature selection.
References:
[1] Abdulrahman Al-Abassi et al., “An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System,” IEEE Access, vol. 8, pp. 83965-83973, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Iqbal H. Sarker et al., “Intrudtree: A Machine Learning Based Cyber Security Intrusion Detection Model,” Symmetry, vol. 12, no. 5, pp. 1-15, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Yihao Wan, and Tomislav Dragičević, “Data-Driven Cyber-Attack Detection of Intelligent Attacks in Islanded DC Microgrids,” IEEE Transactions on Industrial Electronics, vol. 70, no. 4, pp. 4293-4299, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Fargana J. Abdullayeva, “Detection of Cyberattacks in Cloud Computing Service Delivery Models using Correlation Based Feature Selection,” IEEE 15th International Conference on Application of Information and Communication Technologies, Baku, Azerbaijan, pp. 1-4, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Carmelo Ardito et al., “An Artificial Intelligence Cyberattack Detection System to Improve Threat Reaction in e-Health,” Italian Conference on Cybersecurity, pp. 270-283, 2021.
[Google Scholar] [Publisher Link]
[6] Md Mamunur Rashid et al., “Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques," International Journal of Environmental Research and Public Health, vol. 17, no. 24, pp. 1-21, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Rahul Chourasiya, Vaibhav Patel, and Anurag Shrivastava, “Classification of Cyber Attack Using Machine Learning Technique at Microsoft Azure Cloud,” International Research Journal of Engineering & Applied Sciences, pp. 4-8, 2018.
[Google Scholar] [Publisher Link]
[8] Prabhat Kumar, Govind P. Gupta, and Rakesh Tripathi, “An Ensemble Learning and Fog-Cloud Architecture-Driven Cyber-Attack Detection Framework for IoMT Networks,” Computer Communications, vol. 166, pp. 110-124, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Khoi Khac Nguyen et al., “Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach,” IEEE Wireless Communications and Networking Conference, Barcelona, Spain, pp. 1-6, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Xiayang Chen et al., “Ensemble Learning Methods for Power System Cyber-Attack Detection,” IEEE 3rd International Conference on Cloud Computing and Big Data Analysis, Chengdu, China, pp. 613-616, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Subba Reddy Borra et al., “OEC-NET: Optimal Feature Selection-Based Email Classification Network Using Unsupervised Learning with Deep CNN Model,” e-Prime-Advances in Electrical Engineering, Electronics and Energy, vol. 7, 2024. [CrossRef] [Google Scholar] [Publisher Link]
[12] Muhammad Ajmal Azad et al., “DEEPSEL: A Novel Feature Selection for Early Identification of Malware in Mobile Applications,” Future Generation Computer Systems, vol. 129, pp. 54-63, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Esraa Saleh Alomari et al., “Malware Detection Using Deep Learning and Correlation-Based Feature Selection,” Symmetry, vol. 15, no. 1, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Yunchun Zhang et al., “Deep Hashing for Malware Family Classification and New Malware Identification,” IEEE Internet of Things Journal, vol. 11, no. 16, pp. 26837-26851, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Muhammad Shoaib Akhtar, and Tao Feng, “Detection of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real Time,” Symmetry, vol. 14, no. 11, pp. 1-12, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ragini Mokkapati, and Venkata Lakshmi Dasari, “Embedded Signal Artificial Neural Network Based Intelligent Non-Dependent Feature Selection for Cyber Attack Classification in Signal-Based Networks,” Signal Processing, vol. 40, no. 3, pp. 905-914, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Shamimul Qamar, “Healthcare Data Analysis by Feature Extraction and Classification Using Deep Learning with Cloud Based Cyber Security,” Computers and Electrical Engineering, vol. 104, no. A, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Hashida Haidros Rahima Manzil, and S. Manohar Naik, “Android Ransomware Detection using a Novel Hamming Distance Based Feature Selection,” Journal of Computer Virology and Hacking Techniques, vol. 20, no. 1, pp. 71-93, 2024. [CrossRef] [Google Scholar] [Publisher Link]
[19] G. Tirumala Vasu et al., “Improved Chimp Optimization Algorithm (ICOA) Feature Selection and Deep Neural Network Framework for Internet of Things (IOT) Based Android Malware Detection,” Measurement: Sensors, vol. 28, pp. 1-8, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[20] Nikolaos Polatidis et al., “FSSDroid: Feature Subset Selection for Android Malware Detection,” World Wide Web, vol. 27, no. 5, pp. 1-17, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Rajasekhar Chaganti, Vinayakumar Ravi, and Tuan D. Pham, “A Multi-View Feature Fusion Approach for Effective Malware Classification using Deep Learning,” Journal of Information Security and Applications, vol. 72, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Akhil Mittal, and Pandi Kirupa Gopalakrishna Pandian, “Deep Learning Approaches to Malware Detection and Classification,” International Journal of Multidisciplinary Innovation and Research Methodology, vol. 3, no. 1, pp. 70-76, 2024.
[Google Scholar] [Publisher Link]
[23] Vinayakumar Ravi, and Mamoun Alazab, “Attention-Based Convolutional Neural Network Deep Learning Approach for Robust Malware Classification,” Computational Intelligence, vol. 39, no. 1, pp. 145-168, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Uday Chandra Akuthota, and Lava Bhargava, “A Deep Learning Approach for the Detection of Intrusions with an Ensemble Feature Selection Method,” SN Computer Science, vol. 5, no. 7, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Kamran Shaukat, Suhuai Luo, and Vijay Varadharajan, “A Novel Deep Learning-Based Approach for Malware Detection,” Engineering Applications of Artificial Intelligence, vol. 122, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Sanjeev Kumar, B. Janet, and Subramanian Neelakantan, “IMCNN: Intelligent Malware Classification using Deep Convolution Neural Networks as Transfer Learning and Ensemble Learning in Honeypot Enabled Organizational Network,” Computer Communications, vol. 216, pp. 16-33, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] S. Jebin Bose, and R. Kalaiselvi, “An Optimal Deep Learning-Based Framework for the Detection and Classification of Android Malware,” Journal of Intelligent & Fuzzy Systems, vol. 44, no. 6, pp. 9297-9310, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Changkang Sun et al., “An Enhanced FCM Clustering Method Based on Multi-Strategy Tuna Swarm Optimization,” Mathematics, vol. 12, no. 3, pp. 1-16, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Mhamad Bakro et al., “Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms along with Random Forest Model,” IEEE Access, vol. 12, pp. 8846-8874, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Chang'an Zhou et al., “Tool Wear Monitoring for Robotic Milling Based on Multi-Dimensional Stacked Sparse Autoencoders and Bidirectional LSTM Networks with Singularity Features,” Research Square, pp. 1-22, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Fatma Refaat Ahmed et al., “A Novel Approach to Optimize LSTM Hyperparameter Using the Chimp Optimization Algorithm for the Pressure Ventilator Prediction,” Research Square, pp. 1-27, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Mansour Ahmadi et al., “Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification,” Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, New York, United States, pp. 183-194, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Muhammad Furqan Rafique et al., “Malware Classification using Deep Learning Based Feature Extraction and Wrapper Based Feature Selection Technique,” Arxiv, pp. 1-21, 2019.
[CrossRef] [Google Scholar] [Publisher Link]