ISSN 1816-353X (Print) Vol. 22, No. 5 (September 2020) ISSN 1816-3548 (Online)
Total Page:16
File Type:pdf, Size:1020Kb
ISSN 1816-353X (Print) Vol. 22, No. 5 (September 2020) ISSN 1816-3548 (Online) INTERNATIONAL JOURNAL OF NETWORK SECURITY Editor-in-Chief Prof. Min-Shiang Hwang John C.S. Lui Department of Computer Science & Information Engineering, Asia Department of Computer Science & Engineering, Chinese University of University, Taiwan Hong Kong (Hong Kong) Kia Makki Co-Editor-in-Chief: Telecommunications and Information Technology Institute, College of Prof. Chin-Chen Chang (IEEE Fellow) Engineering, Florida International University (USA) Department of Information Engineering and Computer Science, Feng Chia University, Taiwan Gregorio Martinez University of Murcia (UMU) (Spain) Publishing Editors Sabah M.A. Mohammed Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang Department of Computer Science, Lakehead University (Canada) Lakshmi Narasimhan Board of Editors School of Electrical Engineering and Computer Science, University of Newcastle (Australia) Ajith Abraham Khaled E. A. Negm School of Computer Science and Engineering, Chung-Ang University Etisalat University College (United Arab Emirates) (Korea) Wael Adi Joon S. Park Institute for Computer and Communication Network Engineering, Technical School of Information Studies, Syracuse University (USA) University of Braunschweig (Germany) Antonio Pescapè Sheikh Iqbal Ahamed University of Napoli "Federico II" (Italy) Department of Math., Stat. and Computer Sc. Marquette University, Chuan Qin Milwaukee (USA) University of Shanghai for Science and Technology (China) Vijay Atluri Yanli Ren MSIS Department Research Director, CIMIC Rutgers University (USA) School of Commun. & Infor. Engineering, Shanghai University (China) Mauro Barni Mukesh Singhal Dipartimento di Ingegneria dell’Informazione, Università di Siena (Italy) Department of Computer Science, University of Kentucky (USA) Andrew Blyth Tony Thomas Information Security Research Group, School of Computing, University of School of Computer Engineering, Nanyang Technological University Glamorgan (UK) (Singapore) Chi-Shiang Chan Mohsen Toorani Department of Applied Informatics & Multimedia, Asia University (Taiwan) Department of Informatics, University of Bergen (Norway) Chen-Yang Cheng Sherali Zeadally National Taipei University of Technology (Taiwan) Department of Computer Science and Information Technology, University Soon Ae Chun of the District of Columbia, USA College of Staten Island, City University of New York, Staten Island, NY Jianping Zeng (USA) School of Computer Science, Fudan University (China) Stefanos Gritzalis Justin Zhan University of the Aegean (Greece) School of Information Technology & Engineering, University of Ottawa (Canada) Lakhmi Jain School of Electrical and Information Engineering, Ming Zhao University of South Australia (Australia) School of Computer Science, Yangtze University (China) Chin-Tser Huang Mingwu Zhang Dept. of Computer Science & Engr, Univ of South Carolina (USA) College of Information, South China Agric University (China) James B D Joshi Yan Zhang Dept. of Information Science and Telecommunications, University of Wireless Communications Laboratory, NICT (Singapore) Pittsburgh (USA) Ç etin Kaya Koç PUBLISHING OFFICE School of EECS, Oregon State University (USA) Min-Shiang Hwang Department of Computer Science & Information Engineering, Asia Shahram Latifi Department of Electrical and Computer Engineering, University of Nevada, University, Taichung 41354, Taiwan, R.O.C. Email: [email protected] Las Vegas (USA) Cheng-Chi Lee International Journal of Network Security is published both in traditional Department of Library and Information Science, Fu Jen Catholic University paper form (ISSN 1816-353X) and in Internet (ISSN 1816-3548) at (Taiwan) http://ijns.jalaxy.com.tw Chun-Ta Li PUBLISHER: Candy C. H. Lin Department of Information Management, Tainan University of Technology (Taiwan) © Jalaxy Technology Co., Ltd., Taiwan 2005 23-75, P.O. Box, Taichung, Taiwan 40199, R.O.C. Iuon-Chang Lin Department of Management of Information Systems, National Chung Hsing University (Taiwan) Volume: 22, No: 5 (September 1, 2020) International Journal of Network Security Research on Malware Detection and Classification Based on Artificial 1. Intelligence Li-Chin Huang, Chun-Hsien Chang, and Min-Shiang Hwang, pp. 717-727 2. A BLS Signature Scheme from Multilinear Maps Fei Tang and Dong Huang, pp. 728-735 3. Eighth Power Residue Double Circulant Self-Dual Codes Changsong Jiang, Yuhua Sun, and Xueting Liang, pp. 736-742 Identity-based Public Key Cryptographic Primitive with Delegated Equality Test 4. Against Insider Attack in Cloud Computing Seth Alornyo, Acheampong Edward Mensah, and Abraham Opanfo Abbam, pp. 743-751 5. One-Code-Pass User Authentication Based on QR Code and Secret Sharing Yanjun Liu, Chin-Chen Chang, and Peng-Cheng Huang, pp. 752-762 Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General 6. Structures Supporting Leakage-Resilience Xiaoxu Gao and Leyou Zhang, pp. 763-774 7. A Distributed Density-based Outlier Detection Algorithm on Big Data Lin Mei and Fengli Zhang, pp. 775-781 8. Binary Executable Files Homology Detection with Genetic Algorithm Jinyue Bian and Quan Qian, pp. 782-792 A New Diffusion and Substitution-based Cryptosystem for Securing Medical 9. Image Applications L. Mancy and S. Maria Celestin Vigila, pp. 793-800 10. A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation Shanshan Zhang, pp. 801-808 Verifiable Secret Sharing Based On Micali-Rabin's Random Vector 11. Representations Technique Haiou Yang and Youliang Tian, pp. 809-814 A Privacy-Preserving Data Sharing System with Decentralized Attribute-based 12. Encryption Scheme Li Kang and Leyou Zhang, pp. 815-827 13. Evidence Gathering of Facebook Messenger on Android Ming-Sang Chang and Chih-Ping Yen, pp. 828-837 14. Protection of User Data by Differential Privacy Algorithms Jian Liu and Feilong Qin, pp. 838-844 Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation 15. for Electronic Health Record System Zhenhua Liu, Yan Liu, Jing Xu, and Baocang Wang, pp. 845-856 An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key 16. Pre-distribution Bin Wang, pp. 857-862 17. Survey on Attribute-based Encryption in Cloud Computing P. R. Ancy, Addapalli V. N. Krishna, K. Balachandran, M. Balamurugan, and O. S. Gnana Prakasi, pp. 863-868 A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural 18. Network and Logistic Chaotic Sequence Shoulin Yin, Jie Liu, and Lin Teng, pp. 869-873 A Novel Blockchain-based Anonymous Handover Authentication Scheme in 19. Mobile Networks ChenCheng Hu, Dong Zheng, Rui Guo, AXin Wu, Liang Wang, and ShiYao Gao, pp. 874-884 New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud 20. Storage Changsong Yang, Xiaoling Tao, and Qiyu Chen, pp. 885-896 International Journal of Network Security, Vol.22, No.5, PP.717-727, Sept. 2020 (DOI: 10.6633/IJNS.202009 22(5).01) 717 Research on Malware Detection and Classification Based on Artificial Intelligence Li-Chin Huang1, Chun-Hsien Chang2, and Min-Shiang Hwang3;4 (Corresponding author: Min-Shiang Hwang) Department of Information Management, Executive Yuan, Taipei 10058, Taiwan1 Department of Management Information Systems, National Chung Hsing University, Taiwan2 Department of Computer Science & Information Engineering, Asia University, Taichung, Taiwan3 500, Lioufeng Rd., Wufeng, Taichung 41354, Taichung, Taiwan, R.O.C. Department of Medical Research, China Medical University Hospital, China Medical University, Taiwan4 (Email: [email protected]) (Received Apr. 13, 2020; Revised and Accepted July 8, 2020; First Online July 9, 2020) Abstract erated adversarial network is optimized for small sample malware detection. Malware remains one of the major threats to network Keywords: Android Malware; Deep Learning; Machine security. As the types of network devices increase, in ad- Learning; Malware; Ransomware Detection dition to attacking computers, the amount of malware that affects mobile phones and the Internet of Things de- vices has also significantly increased. Malicious software 1 Introduction can alter the regular operation of the victim's machine, damage user files, steal private information from the user, Today, malware is still one of the significant cybersecu- steal user permissions, and perform unauthorized activi- rity threats [2,10]. According to Symantec's 2018 Cyber- ties on the device. For users, in addition to the inconve- security Threat Report [23]: In terms of traditional mal- nience caused by using the device, it also poses a threat ware that affects computers, the total number of malware to property and information. Therefore, in the face of variants discovered in 2017 was as high as 669 million, an malware threats, if it can accurately and quickly detect increase of 87.7% from the amount found in 2016; In terms its presence and deal with it, it can help reduce the im- of malware that affects mobile devices such as cell phones, pact of malware. To improve the accuracy and efficiency the number of new variants has increased from 17,000 to of malware detection, this article will use deep learning 27,000, an increase of about 55%. Due to the advance- technology in the field of artificial intelligence to study ment and popularization of IoT technology, the number and implement high-precision classification models to im- of malware that affects IoT devices has increased signifi- prove the effectiveness of malware detection. We will use cantly in recent years. The report