Research article Special Issues

Leveraging deep learning and image conversion of executable files for effective malware detection: A static malware analysis approach

  • Received: 15 March 2024 Revised: 07 April 2024 Accepted: 17 April 2024 Published: 26 April 2024
  • MSC : 68T45, 68U20

  • The escalating sophistication of malware poses a formidable security challenge, as it evades traditional protective measures. Static analysis, an initial step in malware investigation, involves code scrutiny without actual execution. One static analysis approach employs the conversion of executable files into image representations, harnessing the potency of deep learning models. Convolutional neural networks (CNNs), particularly adept at image classification, have potential for malware detection. However, their inclination towards structured data requires a preprocessing phase to convert software into image-like formats. This paper outlines a methodology for malware detection that involves applying deep learning models to image-converted executable files. Experimental evaluations have been performed by using CNN models, autoencoder-based models, and pre-trained counterparts, all of which have exhibited commendable performance. Consequently, employing deep learning for image-converted executable analysis emerges as a fitting strategy for the static analysis of software. This research is significant because it utilized the largest dataset to date and encompassed a wide range of deep learning models, many of which have not previously been tested together.

    Citation: Mesut GUVEN. Leveraging deep learning and image conversion of executable files for effective malware detection: A static malware analysis approach[J]. AIMS Mathematics, 2024, 9(6): 15223-15245. doi: 10.3934/math.2024739

    Related Papers:

    [1] Yujia Xiang, Yuqi Jiao, Xin Wang, Ruizhi Yang . Dynamics of a delayed diffusive predator-prey model with Allee effect and nonlocal competition in prey and hunting cooperation in predator. Electronic Research Archive, 2023, 31(4): 2120-2138. doi: 10.3934/era.2023109
    [2] Wenbin Zhong, Yuting Ding . Spatiotemporal dynamics of a predator-prey model with a gestation delay and nonlocal competition. Electronic Research Archive, 2025, 33(4): 2601-2617. doi: 10.3934/era.2025116
    [3] Fengrong Zhang, Ruining Chen . Spatiotemporal patterns of a delayed diffusive prey-predator model with prey-taxis. Electronic Research Archive, 2024, 32(7): 4723-4740. doi: 10.3934/era.2024215
    [4] Mengting Sui, Yanfei Du . Bifurcations, stability switches and chaos in a diffusive predator-prey model with fear response delay. Electronic Research Archive, 2023, 31(9): 5124-5150. doi: 10.3934/era.2023262
    [5] Miao Peng, Rui Lin, Zhengdi Zhang, Lei Huang . The dynamics of a delayed predator-prey model with square root functional response and stage structure. Electronic Research Archive, 2024, 32(5): 3275-3298. doi: 10.3934/era.2024150
    [6] Ruizhi Yang, Dan Jin . Dynamics in a predator-prey model with memory effect in predator and fear effect in prey. Electronic Research Archive, 2022, 30(4): 1322-1339. doi: 10.3934/era.2022069
    [7] San-Xing Wu, Xin-You Meng . Hopf bifurcation analysis of a multiple delays stage-structure predator-prey model with refuge and cooperation. Electronic Research Archive, 2025, 33(2): 995-1036. doi: 10.3934/era.2025045
    [8] Yichao Shao, Hengguo Yu, Chenglei Jin, Jingzhe Fang, Min Zhao . Dynamics analysis of a predator-prey model with Allee effect and harvesting effort. Electronic Research Archive, 2024, 32(10): 5682-5716. doi: 10.3934/era.2024263
    [9] Jiani Jin, Haokun Qi, Bing Liu . Hopf bifurcation induced by fear: A Leslie-Gower reaction-diffusion predator-prey model. Electronic Research Archive, 2024, 32(12): 6503-6534. doi: 10.3934/era.2024304
    [10] Chen Wang, Ruizhi Yang . Hopf bifurcation analysis of a pine wilt disease model with both time delay and an alternative food source. Electronic Research Archive, 2025, 33(5): 2815-2839. doi: 10.3934/era.2025124
  • The escalating sophistication of malware poses a formidable security challenge, as it evades traditional protective measures. Static analysis, an initial step in malware investigation, involves code scrutiny without actual execution. One static analysis approach employs the conversion of executable files into image representations, harnessing the potency of deep learning models. Convolutional neural networks (CNNs), particularly adept at image classification, have potential for malware detection. However, their inclination towards structured data requires a preprocessing phase to convert software into image-like formats. This paper outlines a methodology for malware detection that involves applying deep learning models to image-converted executable files. Experimental evaluations have been performed by using CNN models, autoencoder-based models, and pre-trained counterparts, all of which have exhibited commendable performance. Consequently, employing deep learning for image-converted executable analysis emerges as a fitting strategy for the static analysis of software. This research is significant because it utilized the largest dataset to date and encompassed a wide range of deep learning models, many of which have not previously been tested together.



    Predator-prey relationship exists widely in nature, and many scholars explore this relationship between populations by studying predator-prey model [1,2,3,4,5]. In the real world, the schooling behavior occurs for various reasons among both predator and prey population [6]. By schooling behavior, prey can effectively avoid the capture of predators, and predators can increase the success rate of predation. For example, the wolves [7], African wild dogs and lions [8] are famous examples who have the schooling behavior among predator individuals. To reflect this effect in predator, Cosner et al. [9] proposed the following functional response

    η(u,v)=Ce0uv1+thCe0uv,

    where u, v, C, e0, and th represent density of prey, density of predator, capture rate, encounter rate, and handling time, respectively. The functional response η(u,v) monotonically increases with respect to the predator. This reflects that the increase in the number of predators will be conducive to the success rate of predation.

    The reaction diffusion equation is widely used in many fields, such as vegetation-water models [10,11], bimolecular models [12,13], population models [14,15,16]. By introducing time and space variables, the reaction-diffusion model can better describe the development law of things. Incorporating the group cooperation in predator and the group defense behavior in prey, J. Yang [17] proposed the following reaction diffusion predator-prey model

    {u(x,t)t=D1Δu+ru(1uK)Ce0uv21+thuv,v(x,t)t=D2Δv+v(εCe0u(x,tτ)v(x,tτ)1+thu(x,tτ)v(x,tτ)d),xΩ,t>0u(x,t)ˉν=v(x,t)ˉν=0,xΩ,t>0u(x,θ)=u0(x,θ)0,v(x,θ)=v0(x,θ)0,xˉΩ,θ[τ,0], (1.1)

    where u(x,t) and v(x,t) represent prey and predator's densities, respectively. r, K, ε, τ and d represent growth rate, environmental capacity, conversion rate, gestation delay and death rate, respectively. The terms u and u(tτ) represent the herd behavior (or group defense behavior) in prey. They studied saddle-node, Hopf and Bogdanov-Takens types of bifurcations, and discussed the effect of diffusion and time delay on this model through numerical simulations [17].

    In the model (1.1), the competition in prey is reflected by the term uK, which supposes this type competition is spatially local. In fact, the resources is limited in nature, and competition within the population always exist. This competition is usually nonlocal. In [18,19], the authors suggested that the consumption of resources in spatial location is related not only to the local population density, but also to the number of nearby population density. Some scholars have studied the predator-prey models with nonlocal competition [20,21,22]. S. Chen et al studied the existence and uniqueness of positive steady states and Hopf bifurcation in a diffusive predator-prey model with nonlocal effect [20]. J. Gao and S. Guo discussed the steady-state bifurcation and Hopf bifurcation in a diffusive predator-prey model with nonlocal effect and Beddington-DeAngelis Functional Response [21]. S. Djilali studied the pattern formation in a diffusive predator-prey model with herd behavior and nonlocal prey competition, and showed rich dynamic phenomena through numerical simulations [23]. These works suggest that the predator-prey models with nonlocal competition will exhibit different dynamic phenomena compared with the model without nonlocal competition, for example the stably spatially inhomogeneous periodic solutions are more likely to appear.

    Based on the model (1.1), we assume there is spatially nonlocal competition in prey. Then, we proposed the following model.

    {u(x,t)t=d1Δu+u(1ΩG(x,y)u(y,t)dy)αuv21+uv,v(x,t)t=d2Δv+v(βu(tτ)v(tτ)1+u(tτ)v(tτ)γ),xΩ,t>0,u(x,t)ˉν=v(x,t)ˉν=0,xΩ,t>0,u(x,θ)=u0(x,θ)0,v(x,θ)=v0(x,θ)0,xˉΩ,θ[τ,0]. (1.2)

    The model (1.2) has been changed by ˜t=r˜t, ˜u=˜uK, ˜v=thCe0Kv, α=1rt2hCe0K3/2, β=εrth and γ=dr, then drop the tilde. ΩG(x,y)u(y,t)dy represents the nonlocal competition effect in prey. We also choose the Newman boundary condition, which is based on the hypothesis that the region is closed and no prey and predator can leave or enter the boundary.

    With the scope of our knowledge, there is no work to study the dynamics of the predator-prey model (1.2) with the nonlocal competition in prey, schooling behavior in predator, reaction diffusion and gestation delay, although it seems more realistic. The aim of this paper is to study the effect of time delay and nonlocal competition on the model (1.2). Whether there exist stable spatially inhomogeneous periodic solutions?

    The paper is organized as follows. In Section 2, the stability of coexisting equilibrium and existence of Hopf bifurcation are considered. In Section 3, the property of Hopf bifurcation is studied. In Section 4, some numerical simulations are given. In Section 5, a short conclusion is obtained.

    For convenience, we choose Ω=(0,lπ). The kernel function G(x,y)=1lπ, which is based on the assumption that the competition strength among prey individuals in the habitat is the same, that is the competition between any two prey is the same. (0,0) and (1,0) are boundary equilibria of model (1.2). The existence of positive equilibria of model (1.2) has been studied in [17], that is

    Lemma 2.1. [17]Assume β>γ, then the model (1.2) has

    two distinct coexisting equilibria E1=(u1,v1) and E2=(u2,v2) with 0<u1<35<u2<1 when α<αc(β,γ):=615β(βγ)125γ2;

    a unique coexisting equilibrium denoted by E3=(u3,v3) when α=αc(β,γ);

    no coexisting equilibrium when α>αc(β,γ).

    Make the following hypothesis

    (H0)β>γ,ααc(β,γ). (2.1)

    If (H0) holds, then model (1.2) has one or two coexisting equilibria. Hereinafter, for brevity, we just denote E(u,v) as coexisting equilibrium. Linearize model (1.2) at E(u,v)

    ut(u(x,t)u(x,t))=D(Δu(t)Δv(t))+L1(u(x,t)v(x,t))+L2(u(x,tτ)v(x,tτ))+L3(ˆu(x,t)ˆv(x,t)), (2.2)

    where

    D=(d100d2),L1=(a1a200),L2=(00b1b2),L3=(u000),

    and a1=1uv2α2u(1+uv)2, a2=(2uv+uv2)α(1+uv)2<0, b1=v2β2u(1+uv)2>0, b2=uvβ(1+uv)2>0, ˆu=1lπlπ0u(y,t)dy. The characteristic equation is

    λ2+Anλ+Bn+(Cnb2λ)eλτ=0,nN0, (2.3)

    where

    A0=ua1,B0=0,C0=b2(ua1)a2b1,An=(d1+d2)n2l2a1,Bn=d1d2n4l4a1d2n2l2,Cn=b2d1n2l2+a1b2a2b1,nN. (2.4)

    When τ=0, the characteristic Eq (2.3) is

    λ2+(Anb2)λ+Bn+Cn=0,nN0, (2.5)

    where

    {A0b2=a1+ub2,B0+C0=b2(ua1)a2b1,Anb2=(d1+d2)n2l2a1b2,Bn+Cn=d1d2n4l4(a1d2+b2d1)n2l2+a1b2a2b1,nN. (2.6)

    Make the following hypothesis

    (H1)Anb2>0,Bn+Cn>0,fornN0. (2.7)

    Theorem 2.2. For model (1.2), assume τ=0 and (H0) holds. Then E(u,v) is locally asymptotically stable under (H1).

    Proof. If (H1) holds, we can obtain that the characteristic root of (2.5) all have negative real parts. Then E(u,v) is locally asymptotically stable.

    Let iω (ω>0) be a solution of Eq (2.3), then

    ω2+iωAn+Bn+(Cnb2iω)(cosωτisinωτ)=0.

    We can obtain cosωτ=ω2(b2An+Cn)BnCnC2n+b22ω2, sinωτ=ω(AnCn+Bnb2b2ω2)C2n+b22ω2. It leads to

    ω4+ω2(A2n2Bnb22)+B2nC2n=0. (2.8)

    Let z=ω2, then (2.8) becomes

    z2+z(A2n2Bnb22)+B2nC2n=0, (2.9)

    and the roots of (2.9) are z±=12[Pn±P2n4QnRn], where Pn=A2n2Bnb22, Qn=Bn+Cn, and Rn=BnCn. If (H0) and (H1) hold, Qn>0(nN0). By direct calculation, we have

    P0=(a1u)2b22>0,Pk=(a1d1k2l2)2+d22n4l4b22,R0=a2b1+b2(ua1)Rk=d1d2k4l4+(b2d1a1d2)k2l2+a2b1a1b2,forkN. (2.10)

    Define

    W1={n|Rn<0,nN0},W2={n|Rn>0,Pn<0,P2n4QnRn>0,nN},W3={n|Rn>0,P2n4QnRn<0,nN0}, (2.11)

    and

    ω±n=z±n,τj,±n={1ω±narccos(V(n,±)cos)+2jπ,V(n,±)sin0,1ω±n[2πarccos(V(n,±)cos)]+2jπ,V(n,±)sin<0.V(n,±)cos=(ω±n)2(b2An+Cn)BnCnC2n+b22(ω±n)2,V(n,±)sin=ω±n(AnCn+Bnb2b2(ω±n)2)C2n+b22(ω±n)2. (2.12)

    We have the following lemma.

    Lemma 2.3. Assume (H0) and (H1) hold, the following results hold.

    Eq (2.3) has a pair of purely imaginary roots±iω+n at τj,+n for jN0 and nW1.

    Eq (2.3) has two pairs of purely imaginary roots±iω±n at τj,±n for jN0 and nW2.

    Eq (2.3) has no purely imaginary root for nW3.

    Lemma 2.4. Assume (H0) and (H1) hold. Then Re(dλdτ)|τ=τj,+n>0, Re(dλdτ)|τ=τj,n<0 for nW1W2 and jN0.

    Proof. By Eq (2.3), we have

    (dλdτ)1=2λ+Anb2eλτ(Cnb2λ)λeλττλ.

    Then

    [Re(dλdτ)1]τ=τj,±n=Re[2λ+Anb2eλτ(Cnb2λ)λeλττλ]τ=τj,±n=[1C2n+b22ω2(2ω2+A2n2Bnb22)]τ=τj,±n=±[1C2n+b22ω2(A2n2Bnb22)24(B2nC2n)]τ=τj,±n.

    Therefore Re(dλdτ)|τ=τj,+n>0, Re(dλdτ)|τ=τj,n<0.

    Denote τ=min{τ0n|nW1W2}. We have the following theorem.

    Theorem 2.5. Assume (H0) and (H1) hold, then the following statements are true for model (1.2).

    E(u,v) is locally asymptotically stable for τ>0 when W1W2=.

    E(u,v) is locally asymptotically stable for τ[0,τ) when W1W2.

    E(u,v) is unstable for τ(τ,τ+ε) for some ε>0 when W1W2.

    Hopf bifurcation occurs at(u,v) when τ=τj,+n (τ=τj,n), jN0, nW1W2. The bifurcating periodic solutions are spatially homogeneous when τ=τj,+0 (τ=τj,0), and spatially inhomogeneous when τ=τj,+n (τ=τj,n) for nN.

    By the works [24,25], we study the property of Hopf bifurcation. For fixed jN0 and nW1W2, we denote ˜τ=τj,±n. Let ˉu(x,t)=u(x,τt)u and ˉv(x,t)=v(x,τt)v. Drop the bar, (1.2) can be written as

    {ut=τ[d1Δu+(u+u)(11lπlπ0(u(y,t)+u)dy)αu+u(v+v)21+u+u(v+v)],vt=τ[d2Δv+(βu(t1)+u(v(t1)+v)1+u(t1)+u(v(t1)+v)γ)(v+v)]. (3.1)

    Rewrite the model (3.1) as

    {ut=τ[d1Δu+a1u+a2vuˆu+α1u2uˆu+α2uv+α3v2+α4u3+α5u2v+α6uv2+α7v3]+h.o.t.,vt=τ[d2Δv+b1u(t1)+b2v(t1)+β1u2(t1)+β2u(t1)v(t1)+β3u2(t1)+β4u3(t1)+β5u2(t1)v(t1)]+β6u(t1)v2(t1)+β7v3(t1)]+h.o.t., (3.2)

    where α1=v2(1+3uv)α8u3/2(1+uv)3, α2=vαu(1+uv)3, α3=uα(1+uv)3, α4=v2(1+4uv+5uv2)α16u5/2(1+uv)4, α5=v(1+4uv)αu3/2(1+uv)4, α6=(1+2uv)α2u(1+uv)4, α7=uα(1+uv)4, β1=v2(1+3uv)β2u3/2(1+uv)3, β2=v(1+uv)β2u(1+uv)3, β3=uvβ(1+uv)3, β4=v2(1+4uv+5uv2)β16u5/2(1+uv)4, β5=v(14uv+3uv2)β2u3/2(1+uv)4, β6=v(2+uv)β2(1+uv)4, β7=u3/2vβ(1+uv)4.

    Define the real-valued Sobolev space X:={(u,v)T:u,vH2(0,lπ),(ux,vx)|x=0,lπ=0}, the complexification of X XC:=XiX={x1+ix2|x1,x2X}. and the inner product <˜u,˜v>:=lπ0¯u1v1dx+lπ0¯u2v2dx for ˜u=(u1,u2)T, ˜v=(v1,v2)T, ˜u,˜vXC. The phase space C:=C([1,0],X) is with the sup norm, then we can write ϕtC, ϕt(θ)=ϕ(t+θ) or 1θ0. Denote β(1)n(x)=(γn(x),0)T, β(2)n(x)=(0,γn(x))T, and βn={β(1)n(x),β(2)n(x)}, where {β(i)n(x)} is an an orthonormal basis of X. We define the subspace of C as Bn:=span{<ϕ(),β(j)n>β(j)n|ϕC,j=1,2}, nN0. There exists a 2×2 matrix function ηn(σ,˜τ) 1σ0, such that ˜τDn2l2ϕ(0)+˜τL(ϕ)=01dηn(σ,τ)ϕ(σ) for ϕC. The bilinear form on C×C is defined by

    (ψ,ϕ)=ψ(0)ϕ(0)01σξ=0ψ(ξσ)dηn(σ,˜τ)ϕ(ξ)dξ, (3.3)

    for ϕC, ψC. Define τ=˜τ+μ, then the system undergoes a Hopf bifurcation at (0,0) when μ=0, with a pair of purely imaginary roots ±iωn0. Let A denote the infinitesimal generators of semigroup, and A be the formal adjoint of A under the bilinear form (3.3). Define the following function

    δ(n0)={1n0=0,0n0N. (3.4)

    Choose ηn0(0,˜τ)=˜τ[(n20/l2)D+L1+L3δ(nn0)], ηn0(1,˜τ)=˜τL2, ηn0(σ,˜τ)=0 for 1<σ<0. Let p(θ)=p(0)eiωn0˜τθ(θ[1,0]), q(ϑ)=q(0)eiωn0˜τϑ(ϑ[0,1]) be the eigenfunctions of A(˜τ) and A corresponds to iωn0˜τ respectively. We can choose p(0)=(1,p1)T, q(0)=M(1,q2), where p1=1a2(iωn0+d1n20/l2a1+uδ(n0)), q2=a2/(iωn0b2eiτωn0+d2n2l2), and M=(1+p1q2+˜τq2(b1+b2p1)eiωn0˜τ)1. Then (3.1) can be rewritten in an abstract form

    dU(t)dt=(˜τ+μ)DΔU(t)+(˜τ+μ)[L1(Ut)+L2U(t1)+L3ˆU(t)]+F(Ut,ˆUt,μ), (3.5)

    where

    F(ϕ,μ)=(˜τ+μ)(α1ϕ1(0)2ϕ1(0)ˆϕ1(0)+α2ϕ1(0)ϕ2(0)+α3ϕ2(0)2+α4ϕ31(0)+α5ϕ21(0)ϕ2(0)+α6ϕ1(0)ϕ22(0)+α7ϕ32(0)β1ϕ21(1)+β2ϕ1(1)ϕ2(1)+β3ϕ22(1)+β4ϕ31(1)+β4ϕ21(1)ϕ2(1)+β6ϕ1(1)ϕ22(1)+β7ϕ32(1)) (3.6)

    respectively, for ϕ=(ϕ1,ϕ2)TC and ˆϕ1=1lπlπ0ϕdx. Then the space C can be decomposed as C=PQ, where P={zpγn0(x)+ˉzˉpγn0(x)|zC}, Q={ϕC|(qγn0(x),ϕ)=0and(ˉqγn0(x),ϕ)=0}. Then, model (3.6) can be rewritten as Ut=z(t)p()γn0(x)+ˉz(t)ˉp()γn0(x)+ω(t,) and ^Ut=1lπlπ0Utdx, where

    z(t)=(qγn0(x),Ut),ω(t,θ)=Ut(θ)2Re{z(t)p(θ)γn0(x)}. (3.7)

    then, we have ˙z(t)=iω)n0˜τz(t)+ˉq(0)<F(0,Ut),βn0>. There exists a center manifold C0 and ω can be written as follow near (0,0).

    ω(t,θ)=ω(z(t),ˉz(t),θ)=ω20(θ)z22+ω11(θ)zˉz+ω02(θ)ˉz22+. (3.8)

    Then, restrict the system to the center manifold is ˙z(t)=iωn0˜τz(t)+g(z,ˉz). Denote g(z,ˉz)=g20z22+g11zˉz+g02ˉz22+g21z2ˉz2+. By direct computation, we have

    g20=2˜τM(ς1+q2ς2)I3,g11=˜τM(ϱ1+q2ϱ2)I3,g02=ˉg20,
    g21=2˜τM[(κ11+q2κ21)I2+(κ12+q2κ22)I4],

    where I2=lπ0γ2n0(x)dx, I3=lπ0γ3n0(x)dx, I4=lπ0γ4n0(x)dx, ς1=δn+α1+α2ξ+α3ξ2, ς2=e2iτωn(β1+ξ(β2+β3ξ)), ϱ1=14(2α12δn+α2ˉξ+α2ξ+2α3ˉξξ), ϱ2=14(2β1+2β3ˉξξ+β2(ˉξ+ξ)), κ11=2W(1)11(0)(1+2α1δn+α2ξ)+2W(2)11(0)(α2+2α3ξ)+W(1)20(0)(1+2α1δn+α2ˉξ)+W(2)20(0)(α2+2α3ˉξ), κ12=12(3α4+α5(ˉξ+2ξ)+ξ(2α6ˉξ+α6ξ+3α7ˉξξ)), κ21=2eiτωnW(1)11(1)(2β1+β2ξ)+2eiτωnW(2)11(1)(β2+2β3ξ)+eiτωnW(1)20(1)(2β1+β2ˉξ)+eiτωnW(2)20(1)(β2+2β3ˉξ), κ22=12eiτωn(3β4+β5(ˉξ+2ξ)+ξ(2β6ˉξ+β6ξ+3β7ˉξξ)).

    Now, we compute W20(θ) and W11(θ) for θ[1,0] to give g21. By (3.7), we have

    ˙ω=˙Ut˙zpγn0(x)˙ˉzˉpγn0(x)=Aω+H(z,ˉz,θ), (3.9)

    where

    H(z,¯z,θ)=H20(θ)z22+H11(θ)z¯z+H02(θ)¯z22+. (3.10)

    Compare the coefficients of (3.8) with (3.9), we have

    (A2iωn0˜τI)ω20=H20(θ),Aω11(θ)=H11(θ). (3.11)

    Then, we have

    ω20(θ)=g20iωn0˜τp(0)eiωn0˜τθˉg023iωn0˜τˉp(0)eiωn0˜τθ+E1e2iωn0˜τθ,ω11(θ)=g11iωn0˜τp(0)eiωn0˜τθˉg11iωn0˜τˉp(0)eiωn0˜τθ+E2, (3.12)

    where E1=n=0E(n)1, E2=n=0E(n)2,

    E(n)1=(2iωn0˜τI01e2iωn0˜τθdηn0(θ,ˉτ))1<˜F20,βn>,E(n)2=(01dηn0(θ,ˉτ))1<˜F11,βn>,nN0, (3.13)
    <˜F20,βn>={1lπˆF20,n00,n=0,12lπˆF20,n00,n=2n0,1lπˆF20,n0=0,n=0,0,other,<˜F11,βn>={1lπˆF11,n00,n=0,12lπˆF11,n00,n=2n0,1lπˆF11,n0=0,n=0,0,other,

    and ˆF20=2(ς1,ς2)T, ˆF11=2(ϱ1,ϱ2)T.

    Thus, we can obtain

    c1(0)=i2ωn˜τ(g20g112|g11|2|g02|23)+12g21,μ2=Re(c1(0))Re(λ(˜τ)),T2=1ωn0˜τ[Im(c1(0))+μ2Im(λ(τjn))],β2=2Re(c1(0)). (3.14)

    Theorem 3.1. For any critical value τjn (nS,jN0), we have the following results.

    When μ2>0 (resp.<0), the Hopf bifurcation is forward (resp. backward).

    When β2<0 (resp. >0), the bifurcating periodic solutions on the center manifold are orbitally asymptotically stable(resp. unstable).

    When T2>0 (resp. T2<0), the period increases (resp. decreases).

    To verify our theoretical results, we give the following numerical simulations. Fix parameters

    α=1.07,γ=0.2,l=2,d1=1,d2=1. (4.1)

    The bifurcation diagram of model (1.2) with parameter β is given in Figure 1. We can see that with the increase of parameter β, the stable region of positive equilibrium (u,v) will decrease.

    Figure 1.  Bifurcation diagram of model (1.2) with parameter β.

    Especially, fix β=0.595, we can obtain E1(0.5362,0.6914) and E2(0.6616,0.6225) are two positive equilibria. It is easy to obtain that E2 is always unstable. Then we mainly consider the stability of E1. It can be verified that (H1) holds. By direct calculation, we have τ=τ0,+10.6271<τ0,+05.7949. When τ=τ, we have μ2147.6936, β26.770 and T248.7187, then E1 is locally asymptotically stable for τ<τ (shown in Figure 2). And the stable inhomogeneous periodic solutions exists for τ>τ (shown in Figure 3). To compare our result with the work in [17], we give the numerical simulations of model (1.2) without nonlocal competition same with the model in [17] under the same parameter τ=4 in Figure 4. We can see that nonlocal competition is the key to the existence of stable inhomogeneous periodic solutions.

    Figure 2.  The numerical simulations of model (1.2) with τ=0.5. The positive equilibrium E1 is asymptotically stable.
    Figure 3.  The numerical simulations of model (1.2) with τ=4. The positive equilibrium E1 is unstable and there exists a spatially inhomogeneous periodic solution with mode-1 spatial pattern.
    Figure 4.  The numerical simulations of model (1.2) without nonlocal competition, and with τ=4. The positive equilibrium E1 is asymptotically stable.

    To consider the effect of space length on the stability of the positive equilibrium (u,v), we give the bifurcation diagram of model (1.2) with parameter l (Figure 5) as other parameters fixed in (4.1) and β=0.595. We can see that when the parameter l smaller than the critical value, stable region of the positive equilibrium (u,v) remains unchanged. This means that the spatial diffusion will not affect the stability of the positive equilibrium (u,v). When the parameter l is larger than the critical value, increasing of parameter l will cause the stable region of positive equilibrium (u,v) decrease. This means that the increase of space area will not be conducive to the stability of the positive equilibrium (u,v), and the inhomogeneous periodic oscillations of prey and predator's population densities may occur.

    Figure 5.  Bifurcation diagram of model (1.2) with parameter l.

    In this paper, we study a delayed diffusive predator-prey system with nonlocal competition and schooling behavior in prey. By using time delay as parameter, we study the local stability of the positive equilibrium and Hopf bifurcation at the positive equilibrium. We also analyze the property of Hopf bifurcation by center manifold theorem and normal form method. Through numerical simulation, we consider the effect of nonlocal competition on the model (1.2). Our results suggest that time delay can affect the stability of the positive equilibrium. When time delay is smaller than the critical value, the positive equilibrium is locally stable, and becomes unstable when time delay larger than the critical value. Then the prey and predator's population densities will oscillate periodically. But under the same parameters, spatial inhomogeneous periodic oscillations of prey and predator's population densities will appear in the model with nonlocal competition, and prey and predator's population densities will tend to the positive equilibrium in the model without nonlocal competition. This means that time delay can induce spatial inhomogeneous periodic oscillations in the predator-prey model with the nonlocal competition term, which is different from the model without the nonlocal competition term. In addition, we obtain that the increase of space area will not be conducive to the stability of the positive equilibrium (u,v), and may induce the inhomogeneous periodic oscillations of prey and predator's population densities under some parameters.

    This research is supported by the Fundamental Research Funds for the Central Universities (Grant No. 2572022BC01), Postdoctoral program of Heilongjiang Province (No. LBH-Q21060), and College Students Innovations Special Project funded by Northeast Forestry University (No. 202210225160).

    The authors declare there is no conflicts of interest.



    [1] K. Liu, S. Xu, G. Xu, M. Zhang, D. Sun, H. Liu, A review of android malware detection approaches based on machine learning, IEEE Access, 8 (2020). https://doi.org/10.1109/ACCESS.2020.3006143
    [2] B. Amos, H. Turner, J. White, Applying machine learning classifiers to dynamic Android malware detection at scale, In: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, Italy, 2013, 1666–1671. https://doi.org/10.1109/IWCMC.2013.6583806
    [3] M. Egele, T. Scholte, E. Kirda, C. Kruegel, A survey on automated dynamic malware-analysis techniques and tools, ACM Comput. Surv., 44 (2012), 1–42.
    [4] B. Amro, Malware detection techniques for mobile devices, Int. J. Mobile Netw. Commun. Telemat., 7 (2017). https://doi.org/10.1145/2089125.2089126
    [5] K. Kavitha, P. Salini, V. Ilamathy, Exploring the malicious Android applications and reducing risk using static analysis, In: 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), IEEE, India, 2016, 1316–1319. https://doi.org/10.1109/ICEEOT.2016.7754896
    [6] E. M. B. Karbab, M. Debbabi, MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports, Digit. Invest., 28 (2019), 77–87. https://doi.org/10.1016/j.diin.2019.01.017 doi: 10.1016/j.diin.2019.01.017
    [7] R. Ito, M. Mimura, Detecting unknown malware from ASCII strings with natural language processing techniques, In: 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), IEEE, Japan, 2019. https://doi.org/10.1109/AsiaJCIS.2019.00-12
    [8] P. Najafi, D. Koehler, F. Cheng, C. Meinel, NLP-based entity behavior analytics for malware detection, In: 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), IEEE, USA, 2021. https://doi.org/10.1109/IPCCC51483.2021.9679411
    [9] U. Raghav, E. Martinez-Marroquin, W. Ma, Static analysis for Android Malware detection with document vectors, In: 2021 International Conference on Data Mining Workshops (ICDMW), IEEE, New Zealand, 2021. https://doi.org/10.1109/ICDMW53433.2021.00104
    [10] X. Xing, X. Jin, H. Elahi, H. Jiang, G. Wang, A malware detection approach using autoencoder in deep learning, IEEE Access, 10 (2022), 25696–25706. https://doi.org/10.1109/ACCESS.2022.3155695 doi: 10.1109/ACCESS.2022.3155695
    [11] Q. Le, O. Boydell, B. Mac, M. Scanlon, Deep learning at the shallow end: Malware classification for non-domain experts, Digit. Invest., 26 (2018), S118–S126. http://dx.doi.org/10.1016/j.diin.2018.04.024 doi: 10.1016/j.diin.2018.04.024
    [12] J. Y. Kim, S. J. Bu, S. B. Cho, Zeroday malware detection using transferred generative adversarial networks based on deep autoencoders, Inform. Sci., 460–461 (2018), 83–102. https://doi.org/10.1016/j.ins.2018.04.092 doi: 10.1016/j.ins.2018.04.092
    [13] I. Goodfellow, NIPS 2016 Tutorial: Generative adversarial networks, arXiv preprint, 2014. https://doi.org/10.48550/arXiv.1701.00160
    [14] S. Kumar, B. Janet, DTMIC: Deep transfer learning for malware image classification, J. Inf. Secur. Appl., 64 (2022). https://doi.org/10.1016/j.jisa.2021.103063
    [15] Ö. Aslan, A. A. Yilmaz, A new malware classification framework based on deep learning algorithms, IEEE Access, 9 (2021), 87936–87951. https://doi.org/10.1109/ACCESS.2021.3089586 doi: 10.1109/ACCESS.2021.3089586
    [16] F. Rustam, I. Ashraf, A. D. Jurcut, A. K. Bashir, Y. B. Zikria, Malware detection using image representation of malware data and transfer learning, J. Parallel Distr. Com., 172 (2023), 32–50. https://doi.org/10.1016/j.jpdc.2022.10.001 doi: 10.1016/j.jpdc.2022.10.001
    [17] T. Li, Y. Luo, X. Wan, Q. Li, Q. Liu, R. Wang, et al., A malware detection model based on imbalanced heterogeneous graph embeddings, Expert Syst. Appl., 246 (2014), 123109.
    [18] Google play store. Available from: https://https://play.google.com/store/apps.
    [19] Virusshare. Available from: http://virusshare.com/.
    [20] Virustotal. Available from: https://www.virustotal.com/gui/home/upload.
    [21] L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath, Malware images: Visualization and automatic classification, In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, 2011, 1–7. https://doi.org/10.1145/2016904.2016908
    [22] A. S. Bozkir, A. O. Cankaya, M. Aydos, Utilization and comparison of convolutional neural networks in malware recognition, In: 2019 27th Signal Processing and Communications Applications Conference (SIU), IEEE, Turkey, 2019, 1–4. https://doi.org/10.1109/SIU.2019.8806511
    [23] MaleVis. Available from: https://web.cs.hacettepe.edu.tr/selman/malevis/.
    [24] S. Venkatraman, M. Alazab, R. Vinayakumar, A hybrid deep learning image-based analysis for effective malware detection, J. Inf. Secur. Appl., 47 (2019), 377–389.
    [25] A. Krizhevsky, I. Sutskever, G. E. Hinton, ImageNet classification with deep convolutional neural networks, Adv. Neural Inform. Proc. Syst., 2012.
    [26] K. Simonyan, A. Zisserman, Very deep convolutional networks for large-scale image recognition, arXiv preprint, 2014. https://doi.org/10.48550/arXiv.1409.1556
    [27] K. He, X. Zhang, S. Ren, J. Sun, Deep residual learning for image recognition, In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016,770–778.
    [28] C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, Z. Wojna, Rethinking the inception architecture for computer vision, In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, 2818–2826.
    [29] G. Huang, Z. Liu, L. Van Der Maaten, K. Q. Weinberger, Densely connected convolutional networks, In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, 4700–4708.
    [30] J. Yosinski, J. Clune, Y. Bengio, H. Lipson, How transferable are features in deep neural networks? In: Advances in Neural Information Processing Systems (NIPS), 2014.
    [31] S. J. Pan, Q. Yang, A survey on transfer learning, IEEE T. Knowl. Data Eng., 22 (2010), 1345–1359. https://doi.org/10.1109/TKDE.2009.191 doi: 10.1109/TKDE.2009.191
    [32] R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, S. Venkatraman, Robust intelligent malware detection using deep learning, IEEE Access, 7 (2019), 46717–46738. https://doi.org/10.1109/ACCESS.2019.2906934 doi: 10.1109/ACCESS.2019.2906934
    [33] J. S. Luo, D. C. T. Lo, Binary malware image classification using machine learning with local binary pattern, In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, USA, 2017, 4664–4667. https://doi.org/10.1109/BigData.2017.8258512
    [34] Z. Cui, F. Xue, X. Cai, Y. Cao, G. G. Wang, J. Chen, Detection of malicious code variants based on deep learning, IEEE T. Ind. Inform., 14 (2018), 3187–3196. https://doi.org/10.1109/tii.2018.2822680 doi: 10.1109/tii.2018.2822680
    [35] D. Gibert, Convolutional neural networks for malware classification, M.S. thesis, Univ. Rovira Virgili, Tarragona, Spain, 2016.
    [36] A. Singh, A. Handa, N. Kumar, S. K. Shukla, Malware classification using image representation, In: Proc. Int. Symp. Cyber Secur. Cryptogr. Mach. Learn. Cham, Switzerland: Springer, 2019, 75–92. https://doi.org/10.1007/978-3-030-20951-3_6
  • This article has been cited by:

    1. Miao Peng, Rui Lin, Zhengdi Zhang, Lei Huang, The dynamics of a delayed predator-prey model with square root functional response and stage structure, 2024, 32, 2688-1594, 3275, 10.3934/era.2024150
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1742) PDF downloads(100) Cited by(1)

Figures and Tables

Figures(7)  /  Tables(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog