Boosting Malware Detection with AlexNet and Optimized Neural Networks Using the Grasshopper Algorithm
DOI:
https://doi.org/10.31185/wjcms.303Keywords:
Malware detection, convolutional neural network, multilayer perceptron, grasshopper algorithmAbstract
That risk is compounded as more critical infrastructure and systems are being managed by computers in general, connected over the Internet. To combat such nefarious software that can steal data and do a number of other privatively outcomes, you need to be very vigilant and also train all our artificial intelligent tools not just to find the malware per se but all the countless other ways in which meddlers might find their way into your computer or set off some enormously disruptive chain reaction (or series thereof). In this research, it is offering a potent new technique by integration of innovative neural network method with conventional artificial intelligence tool known as "multilayer perceptron (MLP)". For the detection of 25 distinct categories of malwares it is obtained 99.84% accuracy rate in classification through in this hybrid system.
Downloads
References
N. Koroniotis, N. Moustafa, and E. Sitnikova, "Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey," IEEE Internet Things J., vol. 6, no. 2, pp. 2439-2455, Apr. 2019.
M. Abugabah, M. H. Alsaidan, S. M. Bashir, and M. A. Alshammari, "The Challenges of Detecting Cybersecurity Attacks in Internet of Things for Industry 4.0," IEEE Access, vol. 9, pp. 29780-29799, Feb. 2021.
M. A. Ferrag, L. Maglaras, and H. Janicke, "Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study," J. Inf. Secur. Appl., vol. 50, p. 102419, 2020. DOI: https://doi.org/10.1016/j.jisa.2019.102419
I. U. Haq, N. Kamran, and H. R. Kanan, "Towards Efficient Malware Detection Using Machine Learning Methods: A Survey," IEEE Access, vol. 9, pp. 173173-173201, Nov. 2021.
T. K. Das, A. K. Sen, and S. Bera, "Deep Learning Techniques for Malware Detection: A Survey," IEEE Syst. J., vol. 15, no. 1, pp. 1149-1162, Mar. 2021.
K. Simonyan and A. Zisserman, "Very Deep Convolutional Networks for Large-Scale Image Recognition," in Proc. Int. Conf. Learn. Represent., San Diego, CA, USA, 2015.
S. Kumar, V. Kumar, and S. P. Sharma, "Optimization of Deep Neural Networks Using Metaheuristic Algorithms for Malware Detection," IEEE Access, vol. 8, pp. 151107-151126, Aug. 2020.
A. Al-Mahameed, O. A. Alomari, A. M. Alkhayyat, and A. Mahmood, "Grey Wolf Optimizer for Feature Selection in Network Intrusion Detection Systems," Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 2, pp. 583-592, 2019.
S. Alsudani and M. N. Saeea, "Enhancing Thyroid Disease Diagnosis through Emperor Penguin Optimization Algorithm," Wasit Journal for Pure Sciences, vol. 2, no. 4, Dec. 2023. DOI: https://doi.org/10.31185/wjps.230
J. Zuech, T. Khoshgoftaar, and R. Wald, "Intrusion Detection and Big Heterogeneous Data: A Survey," J. Big Data, vol. 2, no. 1, pp. 1-41, 2015. DOI: https://doi.org/10.1186/s40537-015-0013-4
P. Sharma, A. Sharma, and R. Gupta, "Hybrid Spam Detection Model Using Deep Neural Networks and Gradient Boosting," in Proc. IEEE Int. Conf. Adv. Comput. Commun. Eng. Tech. (ICACCET), 2022, pp. 1–6.
Y. Chen, Z. Li, W. Chen, and Z. Luo, "Machine Learning in Intrusion Detection: Recent Advances and Challenges," IEEE Access, vol. 7, pp. 181005-181033, Nov. 2019.
X. Zhou and G. Liang, "A Novel Approach for High-Dimensional Malware Detection Using Machine Learning," IEEE Access, vol. 8, pp. 22558-22568, 2020.
M. Kalash et al., "Malware Classification with Deep Convolutional Neural Networks," in Proc. Int. Conf. Comput. Syst. Appl., 2018, pp. 1-8. DOI: https://doi.org/10.1109/NTMS.2018.8328749
V. Vinayakumar, M. Alazab, and S. Soman, "Deep Learning Approaches for Malware Classification: A Comprehensive Review," Comput. Secur., vol. 82, pp. 115-139, 2019.
T. Das, A. Sen, and S. Bera, "Transfer Learning for Malware Detection: A Case Study with AlexNet," IEEE Syst. J., vol. 15, no. 3, pp. 1305-1315, Sept. 2021.
Y. Liu, H. Wei, and X. Liu, "Multilayer Perceptron and CNN Fusion for Malware Detection," IEEE Access, vol. 8, pp. 210290-210301, Nov. 2020.
S. Alsudani, H. Nasrawi, M. Shattawi, and A. Ghazikhani, "Enhancing Spam Detection: A Crow-Optimized FFNN with LSTM for Email Security," Wasit Journal of Computer and Mathematics Science, vol. 3, no. 1, pp. 1-15, Mar. 2024. DOI: https://doi.org/10.31185/wjcms.199
S. Mirjalili, "Grasshopper Optimization Algorithm: Theory and Application," Adv. Eng. Softw., vol. 105, pp. 30-47, 2017. DOI: https://doi.org/10.1016/j.advengsoft.2017.01.004
T. Wang and L. Chen, "Naive Bayes classifier for spam detection," IEEE Transactions on Cybernetics, vol. 46, no. 12, pp. 2878-2889, 2016.
S. Singh, D. Krishnan, and V. Ravi, "Hybrid Models for Malware Detection: Combining CNNs, MLPs, and Optimization Techniques," IEEE Trans. Cybern., vol. 51, no. 4, pp. 2526-2535, Apr. 2021.
S. W. A. Alsudani and A. Ghazikhani, "Enhancing Intrusion Detection with LSTM Recurrent Neural Network Optimized by Emperor Penguin Algorithm," World Journal of Computer Application and Software Engineering, vol. 2, no. 3, 2023. [Online]. Available: https://doi.org/10.31185/wjcms.166. [Accessed: 06-Jul-2024]. DOI: https://doi.org/10.31185/wjcms.166
A. Das, A. Sen, and S. Bera, "Transfer Learning for Malware Detection: A Case Study with AlexNet," IEEE Systems Journal, vol. 16, no. 2, pp. 341-349, June 2022. doi: 10.1109/JSYST.2022.3149167.
R. Kumar, V. Jain, and M. Gupta, "Hybrid CNN-LSTM Model for Deep Malware Detection in Android Systems," IEEE Access, vol. 11, pp. 17509-17520, 2023. doi: 10.1109/ACCESS.2023.3232045.
P. Singh, R. K. Yadav, and S. Sharma, "Dynamic Malware Analysis Using CNN and SVM for Behavioral Feature Extraction," IEEE Transactions on Information Forensics and Security, vol. 18, no. 1, pp. 122-130, Jan. 2023. doi: 10.1109/TIFS.2023.3151765.
B. Ray and R. La, "Deep Learning-Based Intrusion Detection Systems: A Survey," IEEE Access, vol. 9, pp. 73568-73584, 2021.
S. Patel et al., "Hybrid LSTM-PSO for Anomaly-Based Intrusion Detection System," in Proceedings of the 2020 IEEE 7th International Conference on Industrial Engineering and Applications (ICIEA), 2020.
X. Wang and S. Ha, "A novel intrusion detection model based on LDA-RNN for industrial control systems," IEEE Access, vol. 8, pp. 53403-53413, 2020.
A. T. Assy, Y. Mostafa, A. A. El-khaleq, and M. Mashaly, "Anomaly-Based Intrusion Detection System using One-Dimensional Convolutional Neural Network," Procedia Computer Science, vol. 220, pp. 78-85, 2023. DOI: https://doi.org/10.1016/j.procs.2023.03.013
M. Amin, A. Karim, and M. Hossain, "Hybrid Spam Detection Approach Using Machine Learning and Natural Language Processing Techniques," in Proc. IEEE Int. Conf. Comput. Intell. Knowl. Econ. (ICCIKE), 2022, pp.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Mohammed Aswad

This work is licensed under a Creative Commons Attribution 4.0 International License.