P. D. Zegzhda, D. Zegzhda, E. Pavlenko, G. Ignatev
{"title":"Applying deep learning techniques for Android malware detection","authors":"P. D. Zegzhda, D. Zegzhda, E. Pavlenko, G. Ignatev","doi":"10.1145/3264437.3264476","DOIUrl":null,"url":null,"abstract":"This article explores the use of deep learning for malware identification in the Android operating system. Similar studies are considered and, based on their drawbacks, a self-designed approach is proposed for representing an Android application for a convolutional neural network, which consists in constructing an RGB image, the pixels of which are formed from a sequence of pairs of API calls and protection levels. The results of the experimental evaluation of the proposed approach, which are presented in this paper, demonstrate its high efficiency for solving the problem of identifying malicious Android applications.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 11th International Conference on Security of Information and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3264437.3264476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28
Abstract
This article explores the use of deep learning for malware identification in the Android operating system. Similar studies are considered and, based on their drawbacks, a self-designed approach is proposed for representing an Android application for a convolutional neural network, which consists in constructing an RGB image, the pixels of which are formed from a sequence of pairs of API calls and protection levels. The results of the experimental evaluation of the proposed approach, which are presented in this paper, demonstrate its high efficiency for solving the problem of identifying malicious Android applications.