
methods. Moreover, in practical cases, imbalanced
datasets can affect model performance and such situ-
ations can be encountered by technique like Synthetic
Minority Oversampling Technique (SMOTE). Addi-
tional sensitivity analysis can measure the extent of
this impact and gain insights into model’s behavior in
real-world conditions. Zeus, emoted, and trickbot are
few of the most prevalent malwares in banking sector
those basically represent the overall malware attack
scenario in this domain, which is the main reason for
considering these strains, however, in future research,
some other significant malware types could be consid-
ered. Additional future work may include analyzing
the computational cost of our approach with newer
datasets to enhance its scalability and efficiency. We
intend to work on the aforementioned areas for further
improvement of this study in future.
6 CONCLUSIONS
Detecting banking malware is of paramount impor-
tance in safeguarding financial systems and protect-
ing user accounts. This paper presents an empirical
analysis to construct a robust and privacy-preserving
malware detection system specifically tailored for the
financial sector. The approach combines deep ensem-
ble learning and federated learning, utilizing three di-
verse datasets with distinct features. The experimen-
tation involves selecting the best deep learning model
(CNN) from four candidates (CNN, MLP, LSTM,
and TabNet), followed by ensemble model construc-
tion and implementation in the federated learning ap-
proach. Notably, the proposed conditional update of
client models effectively handles the heterogeneity of
datasets, achieving a promising accuracy of 99.30%,
99.74%, and 99.95% for client 1, client 2, and client 3,
respectively. The integration of ensemble CNN with
the proposed FL architecture offers a promising solu-
tion for an effective banking malware detection sys-
tem.
ACKNOWLEDGEMENTS
Part of this study was funded by the ICSCoE Core
Human Resources Development Program and MEXT
Scholarship, Japan.
REFERENCES
Agrafiotis, G., Makri, E., Flionis, I., Lalas, A., Votis, K.,
and Tzovaras, D. (2022). Image-based neural network
models for malware traffic classification using pcap
to picture conversion. In Proceedings of the 17th In-
ternational Conference on Availability, Reliability and
Security, pages 1–7.
An, W., Han, Y., Liu, S., An, B., Tao, T., and Liu, J. Mal-
ware https traffic identification based on convolutional
neural network and autoencoder. Available at SSRN
4302957.
Arik, S. O. and Pfister, T. (2020). Tabnet: Attentive inter-
pretable tabular learning.
Fox, G. and Boppana, R. V. (2022). Detection of malicious
network flows with low preprocessing overhead. Net-
work, 2(4):628–642.
Gezer, A., Warner, G., Wilson, C., and Shrestha, P. (2019).
A flow-based approach for trickbot banking trojan de-
tection. Computers & Security, 84:179–192.
Hsu, R.-H., Wang, Y.-C., Fan, C.-I., Sun, B., Ban, T.,
Takahashi, T., Wu, T.-W., and Kao, S.-W. (2020). A
privacy-preserving federated learning system for an-
droid malware detection based on edge computing. In
2020 15th Asia Joint Conference on Information Se-
curity (AsiaJCIS), pages 128–136. IEEE.
Jiang, C., Yin, K., Xia, C., and Huang, W. (2022). Fedhgc-
droid: An adaptive multi-dimensional federated learn-
ing for privacy-preserving android malware classifica-
tion. Entropy, 24(7):919.
Kazi, M. A., Woodhead, S., and Gan, D. (2019a). Com-
paring and analysing binary classification algorithms
when used to detect the zeus malware. In 2019 Sixth
HCT Information Technology Trends (ITT), pages 6–
11. IEEE.
Kazi, M. A., Woodhead, S., and Gan, D. (2019b). Detect-
ing the zeus banking malware using the random forest
binary classification algorithm and a manual feature
selection process. In International Symposium on Se-
curity in Computing and Communication, pages 286–
297. Springer.
Liu, S., Han, Y., Hu, Y., and Tan, Q. (2021). Fa-net:
Attention-based fusion network for malware https
traffic classification. In 2021 IEEE Symposium on
Computers and Communications (ISCC), pages 1–7.
IEEE.
Lu, K., Cheng, J., and Yan, A. (2023). Malware detection
based on the feature selection of a correlation infor-
mation decision matrix. Mathematics, 11(4):961.
Mahdavifar, S., Kadir, A. F. A., Fatemi, R., Alhadidi,
D., and Ghorbani, A. A. (2020). Dynamic an-
droid malware category classification using semi-
supervised deep learning. In 2020 IEEE Intl Conf
on Dependable, Autonomic and Secure Computing,
Intl Conf on Pervasive Intelligence and Computing,
Intl Conf on Cloud and Big Data Computing, Intl
Conf on Cyber Science and Technology Congress
(DASC/PiCom/CBDCom/CyberSciTech), pages 515–
522. IEEE.
McMahan, B., Moore, E., Ramage, D., Hampson, S., and
y Arcas, B. A. (2017). Communication-efficient learn-
ing of deep networks from decentralized data. In Ar-
tificial intelligence and statistics, pages 1273–1282.
PMLR.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
318