International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 186 - Number 7 |
Year of Publication: 2024 |
Authors: Prashant Kaushik |
10.5120/ijca2024923412 |
Prashant Kaushik . A Generative Adversarial Approach for Malware Detection: Android Case Study. International Journal of Computer Applications. 186, 7 ( Feb 2024), 43-46. DOI=10.5120/ijca2024923412
Identifying infected Android apps relies on extracting key features from apps, both statically and dynamically. Static feature analysis offers a comprehensive view by examining all source code, including bytecode, C++ code, and permission-containing manifest files. Dynamic analysis complements this by observing app behavior in action, such as disk access, system calls, and network activity. Challenges arise when apps update, as feature sets evolve, potentially hindering classification accuracy. To address this, researchers developed a tool combining a GAN (Generative Adversarial Network) and automation to continuously gather and update feature sets for training. The GAN generates similar samples to enhance training and classification capabilities. The proposed classification cascaded with GAN model named TC-GAN, categorizes apps into three classes: malicious, benign, and inconclusive ("can't say"). Using TensorFlow Lite, the model achieved over 82% accuracy on a dataset of 12,000 apps and their variations, with 15 extracted and 10 GAN-generated features.