Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection
Abstract
:1. Introduction and Related Work
- We propose to use two different DCGANs to generate malware images targeting the Android platform. To the best of the authors’ knowledge, this paper represents the first attempt to generate images related to Android malware. As a matter of fact, only the paper published by Nguyen et al. [7] proposes the evaluation of malware images generated by a GAN, but related to PC malware and not to mobile ones;
- Two different variants of the DCGAN were considered;
- Two different sets of images were considered: the first one obtained through static analysis, while the second one generated with dynamic analysis;
- We evaluated the quality of the fake images, by building several machine learning models aimed at discriminating between real and fake images.
2. Background
2.1. GANs
- Good image quality, ensuring the generation of sharp and realistic images that closely resemble those in the training dataset. Blurry or distorted images should be minimized.
- Diversity in image generation, implying that the GAN should be capable of producing a wide variety of images that accurately capture the distribution of the training dataset. This diversity ensures that the model can create different instances of the same concept or object.
- High-quality outputs: GANs, particularly when well-trained, can generate very high-quality images that are often indistinguishable from real images. This makes them suitable for applications requiring realistic image synthesis;
- Versatility: GANs can be used to generate a wide range of images across different domains, including natural images, medical images, and artwork. This versatility makes them applicable to various fields and tasks;
- Ability to capture data distribution: GANs are capable of learning complex data distributions, allowing them to generate diverse images that capture the variability of the training data;
- Unsupervised learning: GANs can learn to generate images in an unsupervised manner, meaning they do not require labeled data. This is particularly useful when labeled data are scarce or expensive to obtain.
- Improved stability: DCGANs introduce architectural guidelines and practices that improve the stability of training GANs. These include the use of strided convolutions instead of pooling layers, batch normalization, and ReLU activations in the generator and LeakyReLU in the discriminator;
- Enhanced image quality: The use of convolutional layers allows DCGANs to capture spatial hierarchies in images more effectively than fully connected layers. This results in higher quality images with better local coherence and fine details;
- Scalability: DCGANs can be scaled to larger and deeper networks, enabling them to generate higher resolution images. This scalability is crucial for applications requiring detailed and high-resolution outputs;
- Reduced overfitting: The architectural choices in DCGANs, such as batch normalization, help reduce overfitting and improve generalization, leading to more diverse and realistic generated images;
- Effective use of the GPU: DCGANs are designed to take full advantage of GPU acceleration, making the training process more efficient and faster compared to traditional GAN architectures.
- Malware generation using GANs: Some research efforts aimed to use GANs to generate malware samples. GANs were employed to create synthetic malware that could evade traditional antivirus and intrusion-detection systems. These generated malware samples could be used for testing the robustness of security systems.
- Evasion techniques: GAN-based malware generation often focuses on finding ways to create malware that could evade detection. This could involve creating polymorphic or metamorphic malware, which can change their code structure while preserving malicious functionality.
- Data augmentation: GANs are used to augment datasets for training machine learning models used in malware detection. By generating additional malware samples, researchers have sought to improve the performance of machine learning classifiers.
- Anomaly detection: GANs are used for anomaly detection in the context of malware analysis. They could be trained on legitimate software samples, and any deviation from the learned distribution could indicate the presence of malware.
- Adversarial attacks: GANs are also explored for launching adversarial attacks against malware-detection models. Adversarial attacks involve generating malicious inputs that, while functionally similar to benign inputs, could fool machine learning models into misclassifying them as non-malicious.
2.2. Image-Based Malware Detection
- Data collection: To train a machine learning model for malware detection, a dataset containing examples of both malicious and benign files is needed. This dataset should include a diverse range of malware samples and legitimate files.
- Feature extraction: Features are characteristics or attributes extracted from the files in the dataset. These features can include the file size, file type, API calls, code behavior, byte sequences, and many others. The goal is to capture distinguishing traits that differentiate malware from legitimate files.
- Model selection: In this phase, a machine learning algorithm or model that is well-suited for the problem to solve is considered. Common choices include decision trees, random forests, support vector machines, neural networks, and ensemble methods.
- Model training: The model is trained on the preprocessed dataset. During training, it learns to recognize patterns and relationships in the features that distinguish malware from non-malware.
- Evaluation: After training, the model is evaluated using a separate dataset (i.e., the so-called test set), which it has never seen before. Common evaluation metrics include precision, recall, and the F-measure.
2.3. CNN
3. The Method
3.1. Image Generation
3.2. Static Analysis Generation
3.3. Dynamic Analysis Generation
- Initialization of the target Android device emulator.
- Installation of the .apk file of the application under analysis on the Android emulator.
- Waiting until the device reaches a stable state, typically when it is in an “epoll_wait” state and the application under analysis is awaiting user input or a system event.
- Commencement of the retrieval of system call traces.
- Sending one of the 25 selected operating system events to the application.
- Dispatching the chosen operating system event to the application under analysis.
- Capturing system calls generated by the application until a stable state is reached.
- Selection of a new operating system event (i.e., the next one in the sequence) and repeating the above steps to capture system call traces for this new event.
- Iterating through the previous step until all 25 operating system events have been used to stimulate the Android application.
- Halting the capture of system calls and saving the acquired system call trace.
- Terminating the process of the Android application under analysis.
- Stopping the Android emulator.
- Reverting the emulator’s disk to a clean snapshot, restoring it to its state before the analyzed Android application was installed.
3.4. DCGANs
3.5. GAN 1
- Substituting pooling layers with strided convolutions in the discriminator and fractionally strided convolutions in the generator;
- Incorporating batch normalization (i.e., batchnorm) in the generator and also the discriminator;
- Eliminating fully connected hidden layers in deeper architectures;
- Using ReLU activation for all generator layers with the exception of the output, which employs tanh;
- Employing LeakyReLU activation in all discriminator layers.
- It transforms the 1D random noise (latent vector) into a 3D shape using the Reshape layer.
- The generator consistently upsamples the noise using the Keras Conv2DTranspose layer (also known as fractionally strided convolution in the paper) to attain the desired output image size, which, in our case, is a grayscale image with dimensions of 28 × 28 × 1.
- Fully connected layers, also known as dense layers, are primarily utilized for reshaping and flattening the noise vector.
- Conv2DTranspose is utilized to upscale the image in the generation process.
- BatchNormalization: utilized to enhance training stability, positioned after the convolutional layer and before the activation function.
- We utilized the LeakyReLU activation function in the discriminator.
- The discriminator deals with two categories of input images: real images sourced from the training dataset labeled as 1 and fake images generated by the generator labeled as 0.
3.6. GAN 2
- Generator: we modified the approach for increasing the model architecture’s resolution to produce a color image.
- Discriminator: we adapted the input image dimensions from 28 × 28 × 1 to 64 × 64 × 3.
- We updated CHANNELS = 3 for color images instead of 1, which is for grayscale images;
- A stride of 2 halves the width and height, so we can work backward to figure out the initial image size dimension: in GAN 1, we upsampled as 7 14 28. Now, we are working with a training image size of 64x64, so we upsampled a few times as 8 16 32 64. This means we added one more set of Conv2DTranspose BatchNormalization ReLU.
- Another change made to the generator is to update the kernel size from 5 to 4 to avoid reducing checkerboard artifacts in the generated images. This is because the kernel size of 5 is not divisible by a stride of 2. So, the solution was to use a kernel size of 4 instead of 5.
3.7. The Detection
4. Experimental Analysis
4.1. Experimental Settings
- GAN 1 static dataset: this experiment is related to the evaluation of images generated with GAN 1 trained with the static dataset;
- GAN 2 static dataset: this experiment is related to the evaluation of images generated with GAN 2 trained with the static dataset;
- GAN 1 dynamic dataset: this experiment is related to the evaluation of images generated with GAN 1 trained with the dynamic dataset;
- GAN 2 dynamic dataset: this experiment is related to the evaluation of images generated with GAN 1 trained with the dynamic dataset.
- Generation of a set for training, i.e., T ⊂ D;
- Generation of an evaluation set T;
- Execution of the model training T;
- Application of the model previously generated to each element of the set.
4.2. The Results
5. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Tasneem, S.; Gupta, K.D.; Roy, A.; Dasgupta, D. Generative Adversarial Networks (GAN) for Cyber Security: Challenges and Opportunities. In Proceedings of the 2022 IEEE Symposium Series on Computational Intelligence, Singapore, 4–7 December 2022; pp. 4–7. [Google Scholar]
- Chhetri, S.R.; Lopez, A.B.; Wan, J.; Al Faruque, M.A. Gan-sec: Generative adversarial network modeling for the security analysis of cyber-physical production systems. In Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy, 25–29 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 770–775. [Google Scholar]
- Dumagpi, J.K.; Jeong, Y.J. Evaluating gan-based image augmentation for threat detection in large-scale xray security images. Appl. Sci. 2020, 11, 36. [Google Scholar] [CrossRef]
- Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial networks. Commun. ACM 2020, 63, 139–144. [Google Scholar] [CrossRef]
- He, H.; Yang, H.; Mercaldo, F.; Santone, A.; Huang, P. Isolation Forest-Voting Fusion-Multioutput: A stroke risk classification method based on the multidimensional output of abnormal sample detection. Comput. Methods Programs Biomed. 2024, 253, 108255. [Google Scholar] [CrossRef]
- Huang, P.; Li, C.; He, P.; Xiao, H.; Ping, Y.; Feng, P.; Tian, S.; Chen, H.; Mercaldo, F.; Santone, A.; et al. MamlFormer: Priori-experience Guiding Transformer Network via Manifold Adversarial Multi-modal Learning for Laryngeal Histopathological Grading. Inf. Fusion 2024, 108, 102333. [Google Scholar] [CrossRef]
- Nguyen, H.; Di Troia, F.; Ishigaki, G.; Stamp, M. Generative adversarial networks and image-based malware classification. J. Comput. Virol. Hacking Tech. 2023, 19, 579–595. [Google Scholar] [CrossRef]
- Zhu, X.; Han, J. Improving anomaly detection in network traffic with GANs. IEEE Trans. Netw. Serv. Manag. 2019, 16, 1234–1245. [Google Scholar]
- Shirazi, H.; Muramudalige, S.R.; Ray, I.; Jayasumana, A.P.; Wang, H. Adversarial autoencoder data synthesis for enhancing machine learning-based phishing detection algorithms. IEEE Trans. Serv. Comput. 2023, 16, 2411–2422. [Google Scholar] [CrossRef]
- Wu, Y.; Nie, L.; Wang, S.; Ning, Z.; Li, S. Intelligent intrusion detection for internet of things security: A deep convolutional generative adversarial network-enabled approach. IEEE Internet Things J. 2021, 10, 3094–3106. [Google Scholar] [CrossRef]
- Chen, H.; Liu, W. Adversarial Malware Detection with Generative Adversarial Networks. IEEE Access 2022, 10, 38472–38483. [Google Scholar]
- Chkirbene, Z.; Abdallah, H.B.; Hassine, K.; Hamila, R.; Erbad, A. Data augmentation for intrusion detection and classification in cloud networks. In 2021 International Wireless Communications and Mobile Computing (IWCMC); IEEE: Piscataway, NJ, USA, 2021; pp. 831–836. [Google Scholar]
- Rahman, S.; Pal, S.; Mittal, S.; Chawla, T.; Karmakar, C. SYN-GAN: A robust intrusion detection system using GAN-based synthetic data for IoT security. Internet Things 2024, 26, 101212. [Google Scholar] [CrossRef]
- Guo, J.; Zhang, W. Application of GANs in detecting Advanced Persistent Threats. Cybersecurity 2021, 4, 45–58. [Google Scholar]
- Mustapha, A.; Khatoun, R.; Zeadally, S.; Chbib, F.; Fadlallah, A.; Fahs, W.; El, A.A. Detecting DDoS attacks using adversarial neural network. Comput. Secur. 2023, 127, 103117. [Google Scholar] [CrossRef]
- Kumar, V.; Kumar, K.; Singh, M. Generating practical adversarial examples against learning-based network intrusion detection systems. Ann. Telecommun. 2024, 1–18. [Google Scholar] [CrossRef]
- Li, S.; Cao, Y.; Liu, S.; Lai, Y.; Zhu, Y.; Ahmad, N. HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN. Expert Syst. Appl. 2024, 238, 122198. [Google Scholar] [CrossRef]
- Kurakin, A.; Goodfellow, I.; Bengio, S. Adversarial machine learning at scale. arXiv 2016, arXiv:1611.01236. [Google Scholar]
- Hu, W.; Tan, Y. Generating adversarial malware examples for black-box attacks based on GAN. In Proceedings of the International Conference on Data Mining and Big Data, Beijing, China, 21–24 November 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 409–423. [Google Scholar]
- Kawai, M.; Ota, K.; Dong, M. Improved malgan: Avoiding malware detector by leaning cleanware features. In Proceedings of the 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Okinawa, Japan, 11–13 February 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 40–45. [Google Scholar]
- Renjith, G.; Laudanna, S.; Aji, S.; Visaggio, C.A.; Vinod, P. GANG-MAM: GAN based enGine for Modifying Android Malware. SoftwareX 2022, 18, 100977. [Google Scholar]
- Nagaraju, R.; Stamp, M. Auxiliary-classifier GAN for malware analysis. In Artificial Intelligence for Cybersecurity; Springer: Berlin/Heidelberg, Germany, 2022; pp. 27–68. [Google Scholar]
- Won, D.O.; Jang, Y.N.; Lee, S.W. PlausMal-GAN: Plausible malware training based on generative adversarial networks for analogous zero-day malware detection. IEEE Trans. Emerg. Top. Comput. 2022, 11, 82–94. [Google Scholar] [CrossRef]
- Yuan, J.; Zhou, S.; Lin, L.; Wang, F.; Cui, J. Black-box adversarial attacks against deep learning based malware binaries detection with GAN. In ECAI 2020; IOS Press: Amsterdam, The Netherlands, 2020; pp. 2536–2542. [Google Scholar]
- Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
- Odena, A.; Buckman, J.; Olsson, C.; Brown, T.; Olah, C.; Raffel, C.; Goodfellow, I. Is generator conditioning causally related to GAN performance? In Proceedings of the International Conference on Machine Learning, PMLR, Stockholm, Sweden, 10–15 July 2018; pp. 3849–3858. [Google Scholar]
- Radford, A.; Metz, L.; Chintala, S. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv 2015, arXiv:1511.06434. [Google Scholar]
- He, K.; Kim, D.S. Malware detection with malware images using deep learning techniques. In Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 95–102. [Google Scholar]
- LeCun, Y.; Bottou, L.; Bengio, Y.; Haffner, P. Gradient-based learning applied to document recognition. Proc. IEEE 1998, 86, 2278–2324. [Google Scholar] [CrossRef]
- Ramachandran, P.; Zoph, B.; Le, Q.V. Searching for Activation Functions. arXiv 2017, arXiv:1710.05941. [Google Scholar]
- Mercaldo, F.; Santone, A. Deep learning for image-based mobile malware detection. J. Comput. Virol. Hacking Tech. 2020, 16, 157–171. [Google Scholar] [CrossRef]
- Zhou, Y.; Jiang, X. Dissecting android malware: Characterization and evolution. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–23 May 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 95–109. [Google Scholar]
- Zhou, Y.; Jiang, X. Android Malware. In SpringerBriefs in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Medvet, E.; Mercaldo, F. Exploring the usage of Topic Modeling for Android Malware Static Analysis. In Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 609–617. [Google Scholar]
- Li, Y.; Jang, J.; Hu, X.; Ou, X. Android malware clustering through malicious payload mining. In Proceedings of the Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, 18–20 September 2017; Proceedings. Springer: Berlin/Heidelberg, Germany, 2017; pp. 192–214. [Google Scholar]
- Bhargava, N.; Sharma, G.; Bhargava, R.; Mathuria, M. Decision tree analysis on j48 algorithm for data mining. Proc. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2013, 3. [Google Scholar]
- Xue, H.; Yang, Q.; Chen, S. SVM: Support vector machines. In The Top Ten Algorithms in Data Mining; Chapman and Hall/CRC: Boca Raton, FL, USA, 2009; pp. 51–74. [Google Scholar]
- Liu, Y.; Wang, Y.; Zhang, J. New machine learning algorithm: Random forest. In Proceedings of the Information Computing and Applications: Third International Conference, ICICA 2012, Chengde, China, 14–16 September 2012; Proceedings 3. Springer: Berlin/Heidelberg, Germany, 2012; pp. 246–252. [Google Scholar]
- Rish, I. An empirical study of the naive Bayes classifier. In Proceedings of the IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, Seattle, WA, USA, 4 August 2001; Volume 3, pp. 41–46. [Google Scholar]
- Jordaney, R.; Sharad, K.; Dash, S.K.; Wang, Z.; Papini, D.; Nouretdinov, I.; Cavallaro, L. Transcend: Detecting concept drift in malware classification models. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Berkeley, CA, USA, 16–18 August 2017; pp. 625–642. [Google Scholar]
Research | Method | Results |
---|---|---|
Zhu and Han (2019) [8] | Developed a GAN-based approach to enhance anomaly detection in network traffic data. Utilized a combination of a GAN and a Long Short-Term Memory (LSTM) network. | Achieved a significant improvement in detecting rare anomalies compared to traditional methods, with a 15% increase in detection accuracy. |
Shirazi et al. (2023) [9] | Proposed a GAN-based framework for generating realistic phishing websites to improve the robustness of anti-phishing tools. The framework included a generator for website generation and a discriminator for classification. | The model effectively generated highly realistic phishing websites, helping to improve the detection rate of existing anti-phishing tools by 20%. |
Wu et al. (2021) [10] | Introduced a GAN-based intrusion-detection system (IDS) that used a semi-supervised learning approach. The method combined a traditional IDS with a GAN to detect unknown attacks. | Enhanced the IDS performance, particularly in detecting zero-day attacks, with a 12% increase in the true positive rate and a reduction in false positives. |
Chen and Liu (2022) [11] | Utilized GANs for malware detection by generating adversarial malware samples to train a more robust malware classifier. The approach involved adversarial training with a focus on evasion attacks. | The robustness of the malware detection system improved significantly, reducing the evasion success rate by 30% compared to conventional methods. |
Chkirbene et al. (2021) [12] | Developed a GAN-based framework for data augmentation in cybersecurity datasets, addressing the issue of imbalanced data. The method generated synthetic data samples to augment the training dataset. | Improved the performance of machine learning models in cybersecurity tasks, with an average increase in accuracy of 10% on imbalanced datasets. |
Rahman et al. (2024) [13] | Designed a GAN model to generate synthetic network traffic data to aid in training more effective intrusion-detection systems. | Successfully increased the accuracy of intrusion-detection systems by 18% by using the synthetic data for training. |
Guo and Zhang (2021) [14] | Implemented a GAN-based approach to detect Advanced Persistent Threats (APTs) by simulating APT behaviors. | The method significantly improved the detection rate of APTs, achieving a 25% increase in detection accuracy compared to conventional methods. |
Mustapha et al. (2023) [15] | Proposed a GAN-based architecture to enhance the detection of distributed denial-of-service (DDoS) attacks by generating realistic attack traffic for training purposes. | Enhanced the ability of DDoS-detection systems to identify attack patterns, leading to a 22% improvement in detection accuracy. |
Kumar et al. (2024) [16] | Utilized GANs to create adversarial examples to test the robustness of cybersecurity systems, specifically focusing on intrusion-detection systems (IDSs). | The study showed that the generated adversarial examples were effective in identifying weaknesses in IDSs, leading to improved robustness and a 15% reduction in false positives. |
Li et al. (2024) [17] | Developed a GAN-based system for automatic detection and classification of botnet attacks in IoT networks. The system used a deep convolutional GAN (DCGAN) for feature extraction and attack detection. | Achieved a high detection rate of 96% for botnet attacks, outperforming traditional detection systems by 20%. |
Epoch | Algorithm | Precision | Recall | F-Measure |
---|---|---|---|---|
0 | J48 | 0.877 | 0.876 | 0.876 |
SVM | 0.870 | 0.869 | 0.869 | |
Random Forest | 0.880 | 0.880 | 0.880 | |
Bayes | 0.839 | 0.838 | 0.838 | |
25 | J48 | 0.892 | 0.892 | 0.892 |
SVM | 0.880 | 0.879 | 0.879 | |
Random Forest | 0.892 | 0.892 | 0.892 | |
Bayes | 0.832 | 0.832 | 0.832 | |
49 | J48 | 0.835 | 0.833 | 0.833 |
SVM | 0.836 | 0.835 | 0.835 | |
Random Forest | 0.837 | 0.837 | 0.837 | |
Bayes | 0.816 | 0.816 | 0.816 |
Epoch | Algorithm | Precision | Recall | F-Measure |
---|---|---|---|---|
0 | J48 | 0.891 | 0.892 | 0.891 |
SVM | 0.883 | 0.884 | 0.883 | |
Random Forest | 0.890 | 0.890 | 0.890 | |
Bayes | 0.847 | 0.842 | 0.844 | |
25 | J48 | 0.877 | 0.878 | 0.887 |
SVM | 0.888 | 0.887 | 0.902 | |
Random Forest | 0.901 | 0.904 | 0.845 | |
Bayes | 0.844 | 0.847 | 0.845 | |
49 | J48 | 0.825 | 0.826 | 0.825 |
SVM | 0.844 | 0.847 | 0.845 | |
Random Forest | 0.841 | 0.847 | 0.843 | |
Bayes | 0.827 | 0.831 | 0.828 |
Epoch | Algorithm | Precision | Recall | F-Measure |
---|---|---|---|---|
0 | J48 | 0.871 | 0.882 | 0.876 |
SVM | 0.873 | 0.874 | 0.873 | |
Random Forest | 0.880 | 0.880 | 0.880 | |
Bayes | 0.837 | 0.832 | 0.834 | |
25 | J48 | 0.877 | 0.878 | 0.877 |
SVM | 0.878 | 0.877 | 0.877 | |
Random Forest | 0.885 | 0.854 | 0.869 | |
Bayes | 0.831 | 0.826 | 0.828 | |
49 | J48 | 0.825 | 0.826 | 0.825 |
SVM | 0.834 | 0.835 | 0.834 | |
Random Forest | 0.832 | 0.835 | 0.833 | |
Bayes | 0.809 | 0.811 | 0.809 |
Epoch | Algorithm | Precision | Recall | F-Measure |
---|---|---|---|---|
0 | J48 | 0.904 | 0.901 | 0.902 |
SVM | 0.901 | 0.901 | 0.901 | |
Random Forest | 0.903 | 0.904 | 0.903 | |
Bayes | 0.868 | 0.877 | 0.872 | |
25 | J48 | 0.877 | 0.878 | 0.877 |
SVM | 0.888 | 0.887 | 0.887 | |
Random Forest | 0.898 | 0.886 | 0.891 | |
Bayes | 0.854 | 0.859 | 0.856 | |
49 | J48 | 0.825 | 0.826 | 0.825 |
SVM | 0.864 | 0.855 | 0.859 | |
Random Forest | 0.874 | 0.876 | 0.874 | |
Bayes | 0.844 | 0.841 | 0.842 |
Epoch | Algorithm | Precision | Recall | F-Measure |
---|---|---|---|---|
99 | J48 | 0.723 | 0.721 | 0.721 |
SVM | 0.701 | 0.715 | 0.707 | |
Random Forest | 0.702 | 0.703 | 0.702 | |
Bayes | 0.697 | 0.699 | 0.697 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mercaldo, F.; Martinelli, F.; Santone, A. Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection. Computers 2024, 13, 154. https://doi.org/10.3390/computers13060154
Mercaldo F, Martinelli F, Santone A. Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection. Computers. 2024; 13(6):154. https://doi.org/10.3390/computers13060154
Chicago/Turabian StyleMercaldo, Francesco, Fabio Martinelli, and Antonella Santone. 2024. "Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection" Computers 13, no. 6: 154. https://doi.org/10.3390/computers13060154
APA StyleMercaldo, F., Martinelli, F., & Santone, A. (2024). Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection. Computers, 13(6), 154. https://doi.org/10.3390/computers13060154