Skip to main content

On the Selection of Key Features for Android Malware Characterization

  • Conference paper
  • First Online:
International Joint Conference (CISIS 2015)

Abstract

Undoubtedly, mobile devices (mainly smartphones and tablets up to now) have become the new paradigm of user-computer interaction. The use of such gadgets is increasing to unexpected figures and, at the same time, the number of potential security risks. This paper focuses on the bad-intentioned Android apps, as it is still the most widely used operating systems for such devices. Accurate detection of this malware remains an open challenge, mainly due to the ever-changing nature of malware and the “open” distribution channel of Android apps through Google Play. Present work uses feature selection for the identification of those features that may help in characterizing mobile Android-based malware. Maximum Relevance Minimum Redundancy and genetic algorithms guided by information correlation measures have been applied to the Android Malware Genome (Malgenome) dataset, attaining interesting results on the most informative features for the characterization of representative families of existing Android malware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Statista - The Statistics Portal, http://www.statista.com/statistics/266219/global-smartphone-sales-since-1st-quarter-2009-by-operating-system/

  2. AppBrain Stats, http://www.appbrain.com/stats/stats-index

  3. F-Secure: Q1 2014 Mobile Threat Report (2015)

    Google Scholar 

  4. Yajin, Z., Xuxian, J.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy 5, 95–109 (2012)

    Google Scholar 

  5. Malgenome Project, http://www.malgenomeproject.org/

  6. Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157–1182 (2003)

    MATH  Google Scholar 

  7. Larrañaga, P., Calvo, B., Santana, R., Bielza, C., Galdiano, J., Inza, I., Lozano, J.A., Armañanzas, R., Santafé, G., Pérez, A.: Machine learning in bioinformatics. Brief. Bioinform 7(1), 86–112 (2006)

    Article  Google Scholar 

  8. Ding, C., Peng, H.: Minimum redundancy feature selection from microarray gene expression data. J. Bioinform. Comput. Biol. 3(02), 185–205 (2005)

    Article  Google Scholar 

  9. Liu, H., Liu, L., Zhang, H.: Ensemble gene selection by grouping for microarray data classification. J. Biomed. Inform. 43(1), 81–87 (2010)

    Article  Google Scholar 

  10. Saeys, Y., Inza, I., Larrañaga, P.: A review of feature selection techniques in bioinformatics. Bioinformatics 23(19), 2507–2517 (2007)

    Article  Google Scholar 

  11. Hatami, N., Chira, C.: Diverse accurate feature selection for microarray cancer diagnosis. Intell. Data Anal. 17(4), 697–716 (2013)

    Google Scholar 

  12. Vinod, P., Laxmi, V., Gaur, M.S., Naval, S., Faruki, P.: MCF: MultiComponent Features for malware analysis. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013, pp. 1076–1081 (2013)

    Google Scholar 

  13. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G.: On the automatic categorisation of android applications. In: 2012 IEEE Consumer Communications and Networking Conference (CCNC), pp. 149–153 (2012)

    Google Scholar 

  14. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P., Álvarez, G.: PUMA: Permission Usage to Detect Malware in Android. In: Herrero Á., Snášel V., Abraham A., Zelinka I., Baruque B., Quintián H., Calvo J.L., Sedano J., Corchado E. (eds.) International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions, vol. 189. Springer, Berlin, Heidelberg. pp. 289–298 (2013)

    Google Scholar 

  15. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, New York (1991)

    Google Scholar 

Download references

Acknowledgments

This research has been partially supported through the project of the Spanish Ministry of Economy and Competitiveness RTC-2014-3059-4. The authors would also like to thank the BIO/BU09/14 and the Spanish Ministry of Science and Innovation PID 560300-2009-11.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Javier Sedano .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sedano, J., Chira, C., González, S., Herrero, Á., Corchado, E., Villar, J.R. (2015). On the Selection of Key Features for Android Malware Characterization. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics