Back close

Detecting Android malware using Long Short-term Memory (LSTM)

Publication Type : Journal Article

Publisher : Journal of Intelligent and Fuzzy Systems

Source : Journal of Intelligent and Fuzzy Systems, IOS Press, Volume 34, Number 3, p.1277-1288 (2018)

Url : https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044749905&doi=10.3233%2fJIFS-169424&partnerID=40&md5=657635465855b0c0317b957d32d19ba5

Keywords : Android (operating system), Brain, Computational costs, Computer crime, Deep learning, Individual behavior, Long short-term memory, Long-range dependencies, malware, Malware detection, Memory architecture, Network architecture, Network parameters, Recurrent neural network (RNN), Static analysis, Static and dynamic analysis, Temporal dynamics

Campus : Coimbatore

School : School of Engineering

Center : Computational Engineering and Networking

Department : Computer Science, Center for Computational Engineering and Networking (CEN), Electronics and Communication

Year : 2018

Abstract : Long Short-term Memory (LSTM) is a sub set of recurrent neural network (RNN) which is specifically used to train to learn long-term temporal dynamics with sequences of arbitrary length. In this paper, long short-term memory (LSTM) architecture is followed for Android malware detection. The data set for evaluation contains real known benign and malware applications from static and dynamic analysis. To achieve acceptable malware detection rates with low computational cost, various LSTM network topologies with several network parameters are used on all extracted features. A stacked LSTM with 32 memory blocks containing one cell each has performed well on detection of all individual behaviors of malicious applications in comparison to other traditional static machine learning classifier. The architecture quantifies experimental results up to 1000 epochs with learning rate 0.1. This is primarily due to the reason that LSTM has the potential to store long-range dependencies across time-steps and to correlate with successive connection sequences information. The experiment achieved the Android malware detection of 0.939 on dynamic analysis and 0.975 on static analysis on well-known datasets.

Cite this Research Publication : R. Vinayakumar, Dr. Soman K. P., Poornachandran, P., and S. Kumar, S., “Detecting Android malware using Long Short-term Memory (LSTM)”, Journal of Intelligent and Fuzzy Systems, vol. 34, pp. 1277-1288, 2018.

Admissions Apply Now