Abstract
Android malware have been growing at an exponential pace and becomes a serious threat to mobile users. It appears that most of the anti-malware still relies on the signature-based detection system which is generally slow and often not able to detect advanced obfuscated malware. Hence time-to-time various authors have proposed different machine learning solutions to identify sophisticated malware. However, it appears that detection accuracy can be improved by using the clustering method. Therefore in this paper, we propose a novel scalable and effective clustering method to improve the detection accuracy of the malicious android application and obtained a better overall accuracy (98.34%) by random forest classifier compared to regular method, i.e., taking the data altogether to detect the malware. However, as far as true positive and true negative are concerned, by clustering method, true positive is best obtained by decision tree (97.59%) and true negative by support vector machine (99.96%) which is the almost same result obtained by the random forest true positive (97.30%) and true negative (99.38%) respectively. The reason that overall accuracy of random forest is high because the true positive of support vector machine and true negative of the decision tree is significantly less than the random forest.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
G DATA Mobile Internet Security. Technical report, G DATA (2017). https://www.gdatasoftware.com/mobile-internet-security-android. Accessed 02 Oct 2018
Smartphone OS Market Share. Technical report, ITC (2017). https://www.idc.com/promo/smartphone-market-share/os. Accessed 02 Oct 2018
APKTOOL. Technical report, Apache (2018). https://ibotpeaches.github.io/Apktool/documentation/. Accessed 02 Oct 2018
Google Play. Technical report, Google (2018). https://play.google.com/store?hl=en. Accessed 02 Oct 2018
How we fought bad apps and malicious developers in 2017. Technical report, Android Developers Blog (2018). https://android-developers.googleblog.com/2018/01/how-we-fought-bad-apps-and-malicious.html. Accessed 02 Oct 2018
McAfee Mobile Threat Report December 2017. Technical report, McAfee (2018). https://www.mcafee.com/content/dam/enterprise/en-us/assets/reports/rp-quarterly-threats-dec-2017.pdf. Accessed 02 Oct 2018
McAfee Mobile Threat Report Q1, 2018. Technical report, McAfee (2018). https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2018.pdf. Accessed 02 Oct 2018
NumPy. Technical report (2018). http://www.numpy.org/. Accessed 02 Oct 2018
Scikit-learn. Technical report (2018). http://scikit-learn.org/stable/#. Accessed 02 Oct 2018
VirusTotal. Technical report, Google (2018). https://www.virustotal.com. Accessed 02 Oct 2018
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: DREBIN: effective and explainable detection of android malware in your pocket. In: NDSS, vol. 14, pp. 23–26 (2014)
Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: PScout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217–228. ACM (2012)
Caliński, T., Harabasz, J.: A dendrite method for cluster analysis. Commun. Stat.-Theory Methods 3(1), 1–27 (1974)
Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)
Chen, T., Mao, Q., Yang, Y., Lv, M., Zhu, J.: TinyDroid: a lightweight and efficient model for android malware detection and classification. Mob. Inf. Syst. 2018, 9 (2018)
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)
Feizollah, A., Anuar, N.B., Salleh, R., Suarez-Tangil, G., Furnell, S.: AndroDialysis: analysis of android intent effectiveness in malware detection. Comput. Secur. 65, 121–134 (2017)
Jiang, X., Zhou, Y.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95–109. IEEE (2012)
Li, J., Sun, L., Yan, Q., Li, Z., Srisa-an, W., Ye, H.: Significant permission identification for machine learning based android malware detection. IEEE Trans. Ind. Inform. 14, 3216–3225 (2018)
Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Van Der Veen, V., Platzer, C.: ANDRUBIS–1,000,000 apps later: a view on current android malware behaviors. In: 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), pp. 3–17. IEEE (2014)
de la Puerta, J.G., Sanz, B., Santos, I., Bringas, P.G.: Using dalvik opcodes for malware detection on android. In: International Conference on Hybrid Artificial Intelligence Systems, pp. 416–426. Springer (2015)
Rana, M.S., Rahman, S.S.M.M., Sung, A.H.: Evaluation of tree based machine learning classifiers for android malware detection. In: International Conference on Computational Collective Intelligence, pp. 377–385. Springer (2018)
Rousseeuw, P.J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20, 53–65 (1987)
Sharma, A., Sahay, S.K.: An investigation of the classifiers to detect android malicious apps. In: Information and Communication Technology, pp. 207–217. Springer (2018)
Sharma, A., Sahay, S.: Group-wise classification approach to improve android malicious apps detection accuracy. Int. J. Netw. Secur. 21(3), 409–417 (2019)
Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: NDSS (2015)
Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., Wu, K.P.: DroidMat: android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62–69. IEEE (2012)
You, W., Liang, B., Li, J., Shi, W., Zhang, X.: Android implicit information flow demystified. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 585–590. ACM (2015)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Rathore, H., Sahay, S.K., Chaturvedi, P., Sewak, M. (2020). Android Malicious Application Classification Using Clustering. In: Abraham, A., Cherukuri, A., Melin, P., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2018 2018. Advances in Intelligent Systems and Computing, vol 941. Springer, Cham. https://doi.org/10.1007/978-3-030-16660-1_64
Download citation
DOI: https://doi.org/10.1007/978-3-030-16660-1_64
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16659-5
Online ISBN: 978-3-030-16660-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)