OOG- Optuna Optimized GAN Sampling Technique for Tabular Imbalanced Malware Data

Cyberspace occupies a large portion of people's life in the age of modern technology, and while there are those who utilize it for good, there are also those who do not. Malware is an application whose construction was not motivated by a benign goal and it can harm, steal, or even alter personal information and secure applications and software. Thus, there are numerous techniques to avoid malware, one of which is to develop samples of malware so that the system can be updated with the growing number of malwares, allowing it to recognize when malwares attempt to enter. The Generative Adversarial Network (GAN) sampling technique has been used in this study to generate new malware samples. GANs have multiple variants, and in order to determine which variant is optimal for a given dataset sample, their parameters must be modified. This study employs Optuna, an autonomous hyperparameter tuning algorithm, to determine the optimal settings for the dataset under consideration. In this study, the architecture of the Optuna Optimized GAN (OOG) method is shown, along with scores of 98.06 precision, recall and f1 score respectively. After tweaking the hyperparameters of five supervised boosting algorithms, XGBoost, LightGBM, CatBoost, Extra Trees Classifier, and Gradient Boosting Classifier, the methodology of this paper additionally employs the weighted ensemble technique to acquire this result. In addition to comparing existing efforts in this domain, the study demonstrates how promising GAN is in comparison to other sampling techniques such as SMOTE.


Auxiliary-Classifier GAN for Malware Analysis

Generative adversarial networks (GAN) are a class of powerful machine le...

GANG-MAM: GAN based enGine for Modifying Android Malware

Malware detectors based on machine learning are vulnerable to adversaria...

DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers

Domain Generation Algorithms (DGAs) are frequently used to generate larg...

IoT Malware Detection Architecture using a Novel Channel Boosted and Squeezed CNN

Interaction between devices, people, and the Internet has given birth to...

Intrusion Detection: Machine Learning Baseline Calculations for Image Classification

Cyber security can be enhanced through application of machine learning b...

"Influence Sketching": Finding Influential Samples In Large-Scale Regressions

There is an especially strong need in modern large-scale data analysis t...

Please sign up or login with your details

Forgot password? Click here to reset