Skip to main content

Mobile App and Malware Classifications by Mobile Usage with Time Dynamics

  • Conference paper
  • First Online:
Book cover Advanced Information Networking and Applications (AINA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 926))

Abstract

Smartphones have become a popular target for cyberattacks. Malware can be embedded into the mobile applications. Several techniques have been proposed to alleviate these problems. However, these solutions may perform experiments by using simulated data, or may require root system privileges, or did not take advantage of the discovered patterns to build more effective malware detection methods. In this paper, we use the SherLock data which is a labeled smartphone dataset that captures ongoing attacks within the low-privileged monitorable features. We analyze the usage behaviors, discover temporal and usage patterns, and further examine multiple classification techniques to predict the type and the running state (i.e., benign and malicious) of the mobile apps by using different combinations of feature sets. Our experiments identified the best feature sets and methods to detect malwares, and we demonstrate the usefulness of temporal information in the predictive analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://bigdata.ise.bgu.ac.il/sherlock/.

  2. 2.

    https://keras.io/.

References

  1. Amos, B., Turner, H., White, J.: Applying machine learning classifiers to dynamic Android malware detection at scale. In: 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC, pp. 1666–1671. IEEE (2013)

    Google Scholar 

  2. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26. ACM (2011)

    Google Scholar 

  3. Chang, S.-W., Cheng, S.-W., Hsiu, P.-C., Kuo, T.-W., Lin, C.-W.: Application behavior analysis in resource consumption for mobile devices. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 1469–1474. ACM (2014)

    Google Scholar 

  4. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)

    Article  Google Scholar 

  5. Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 3. ACM (2012)

    Google Scholar 

  6. Guo, Y., Gu, S.: Multi-label classification using conditional dependency networks. In: IJCAI Proceedings, vol. 22, p. 1300 (2011)

    Google Scholar 

  7. Idika, N., Mathur, A.P.: A survey of malware detection techniques, p. 48. Purdue University (2007)

    Google Scholar 

  8. Jiang, X., Zhou, Y.: Dissecting Android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95–109. IEEE (2012)

    Google Scholar 

  9. Kolosnjaji, B., Zarras, A., Webster, G., Eckert, C.: Deep learning for classification of malware system call sequences. In: Australasian Joint Conference on Artificial Intelligence, pp. 137–149. Springer (2016)

    Google Scholar 

  10. Mirsky, Y., Shabtai, A., Rokach, L., Shapira, B., Elovici, Y.: Sherlock vs moriarty: a smartphone dataset for cybersecurity research. In: Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, pp. 1–12. ACM (2016)

    Google Scholar 

  11. Narudin, F.A., Feizollah, A., Anuar, N.B., Gani, A.: Evaluation of machine learning classifiers for mobile malware detection. Soft Comput. 20(1), 343–357 (2016)

    Article  Google Scholar 

  12. Nix, R., Zhang, J.: Classification of Android apps and malware using deep neural networks. In: International Joint Conference on Neural Networks, pp. 1871–1878. IEEE (2017)

    Google Scholar 

  13. Read, J., Pfahringer, B., Holmes, G., Frank, E.: Classifier chains for multi-label classification. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 254–269. Springer (2009)

    Google Scholar 

  14. Shamili, A.S., Bauckhage, C., Alpcan, T.: Malware detection on mobile devices using distributed machine learning. In: 2010 20th International Conference on Pattern Recognition, ICPR, pp. 4348–4351. IEEE (2010)

    Google Scholar 

  15. Shen, Y., Evans, N., Benameur, A.: Insights into rooted and non-rooted Android mobile devices with behavior analytics. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp. 580–587. ACM (2016)

    Google Scholar 

  16. Shin, C., Hong, J.-H., Dey, A.K.: Understanding and prediction of mobile application usage for smart phones. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp. 173–182. ACM (2012)

    Google Scholar 

  17. Tang, L.-Y., Hsiu, P.-C., Huang, J.-L., Chen, M.-S.: iLauncher: an intelligent launcher for mobile apps based on individual usage patterns. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 505–512. ACM (2013)

    Google Scholar 

  18. Tsoumakas, G., Katakis, I.: Multi-label classification: an overview. Int. J. Data Warehous. Min. (IJDWM) 3(3), 1–13 (2007)

    Article  Google Scholar 

  19. Zheng, Y., Srinivasan, S., Taehun, K.: Exploratory malware analysis of mobile usages. In: Proceedings of the 19th Annual SIG Conference on Information Technology Education, pp. 158–158. ACM (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, Y., Srinivasan, S. (2020). Mobile App and Malware Classifications by Mobile Usage with Time Dynamics. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_50

Download citation

Publish with us

Policies and ethics